Give the answer of muliple choice question

Assignment Help Other Subject
Reference no: EM131397007

1. All of the following are physical threats to information except:

system failures

natural disasters

human error

malicious acts

2.A company decides to plant bushes with sharp thorns on the side of their property facing a field. This would be an example of:

perimeter access control

security planning by environmental design

crime prevention through environmental design

agricultural environmental protection

3.The risk formula is based on:

threat and vulnerability

vulnerability and countermeasures

threat and mitigation

vulnerability and mitigation

4.A security department at a private hospital that is staffed by part time security officers would most likely be classified as a _____ security service organization.

Level IV

Level III

Level II

Level I

5.The type of information that has special value to organizations is:

employee handbooks

intellectual capital

intellectual property

account receivable records

6.Which of the following terms is applied to civil cases involving tort liability when a security officer unreasonably detains an individual without justification?

malicious prosecution

false imprisonment

false arrest

defamation

7.Operational plans would include all of the following except:

organization and authority

Mission, Vision, Values

strengths, weaknesses and opportunities

equipment and weapons

8.The vast majority of security services personnel in the private sector are employed in:

executive protection

contract watch and guard

investigations

transport and cash management

9.Risk to an organization includes:

reputation

people

customers and clients

equipment

all of the above

10.The type of malicious event typically used by disgruntled employees is a:

megabyte

logic bomb

Trojan horse

Countermeasure

11.The following nation has not adopted "smart card" technology for credit transactions:

China

England

United States

India

12.Operationally, an enterprise security risk management system would be supervised by:

the CEO

Chairman of the Board

Chief Security Officer

Chief Financial Officer

13.The most notable development that occurred after 9.11 for security services was:

the re-organization of various federal law enforcement agencies

the passage of various anti-crime legislative acts

the merger of state and federal agencies into national homeland security operations

the takeover of security functions by state governments

the increase of powers given to private security operations

14.A private employer of security personnel could be held liable and required to pay damages for the conduct of its employees based upon:

negligent hiring

negligent training

negligent supervision

all of the above

15.Honeywell, Siemens, and Simplex are examples of companies that provide:

executive protection

alarm services

contract watch and guard

investigations

cash management

16.Fire safety programs include all of the following except:

installation of alarm and fire suppression system

training for employees on how to react when an alarm is sounded

review of building codes for fire safety

reliance on local fire departments for fast and rapid response

17.The major weakness of most CCTV systems is:

the inability to detect human faces at night

the inability to observe crime activity in progress if there are multiple sites

the lack of digital imaging in most network systems

the limits on placing cameras in hidden areas

18.The software technology that enables a criminal to hide data inside another file is:

Trojan horse

worm

steganography

spyware

19.Governmental powers include all of the following except:

evacuation of people

custodial intervention for people who are a threat to themselves

the use of deadly physical force and to carry firearms

planning for disasters

issuance of motor vehicle summonses

20.The trial court in the U.S. court system that handles criminal cases is the:

Supreme Court

Court of Appeals

Court of International Trade

District Court

21.All of the following contributed to the development of national security service organizations in the 19th century except:

railroad construction

telegraph and telephone expansion

intelligence operations during the civil war

state border control operations

the industrial revolution

22.A manager who wants to review the agency's missions and goals for the future would engage in what type of planning:

strategic

operational

short term

emergency

23.The risk management process is composed of which of the following correct steps:

assessment, prioritization of assets/risks, mitigation, operations plan

prioritization of assets/risks, operations planning, assessment, mitigation

mitigation, assessment, prioritization of assets/risks, mitigation

e. asset evaluation, assessment, mitigation, operations plan

24.The technology that enables computers to synchronize with data on PDAs is:

encryption

spyware

image master

universal serial bus

25.The agency mainly responsible for the enforcement of laws and security on the American frontier during the 19th Century was:

Alcohol, Tobacco and Firearms

Secret Service

Customs

Marshals Service

Rangers

26.Security equipment consultants must be chosen on which set of guidelines

cost, track record, reliability, contract need

track record, client satisfaction, cost, government clearance

client satisfaction, service and maintenance, company history, track record

cost, customer satisfaction, state review, state license

27.In Gap Analysis, the objective is to reduce ____________between the goal and the present status or state of affairs.

ambiguity

impediments

outcomes

benchmarks

28.In the prioritization phase, a value must be placed on:

assets and probability or possibilities assigned to threats

countermeasures related to vulnerabilities

the role of liability if a catastrophic event were to occur

profit and loss factors if the business were to shut down

29.The liability concept concerning whether an employer can be held liable for the conduct of its employee is known as:

stare decisis

constitutional tort

vicarious liability

common law

30.Malicious software code that is distributed via the Internet and that infects computers in a manner that impairs the performance of programs or destroys data is known as a:

virus

spyware

keylogger

steganoid

31.If a person performing security services is found negligent that means that he or she:

was reckless

acted intentionally

failed to exercise reasonable care

willfully caused injury

32.To deal with public area security issues, many cites, shopping malls, and schools have installed _________________ systems to increase security.

CCTV

biometric security

Internet communications systems

smart card technology

33.The category of laws that define legal rights and responsibilities is:

substantive law

criminal law

procedural law

public law

34.The United States Secret Service was originally formed to deal with:

terrorists

executive protection

counterfeit money

military intelligence

35.Legal limitations imposed upon the performance of security functions usually are found in:

a constitution

administrative regulations

common law traditions

administrative decisions

36.Which of the following terms describes the identification of weaknesses in an organization's security:

vulnerability assessment

cost benefit analysis

threat analysis

asset valuation

37.All of the following are important for the selection and implementation of countermeasures except:

Regular inspections of telecommunications equipment.

Obtaining credible and trusted serve providers for technical countermeasures.

Performing periodic scans for unauthorized wireless network devices.

Undertaking the selection of countermeasures based on the lowest cost.

38.A global trend is for many American security companies to:

become subsidiaries or major holdings of international security conglomerates

provide security protection for federal and state agencies

take over investigations involving industrial espionage in Europe and Asia.

provide training on counter-terrorism issues to private companies in Europe and Asia

39.Fusion centers were created to:

provide security services to federal facilities

initiate communications facilities to all federal agencies

gather and distribute intelligence on major crimes and terrorism for federal, state, and local agencies

monitor Internet transactions between the U.S. and foreign countries

40.The major issue to determine if security personnel should be armed is:

the response level of municipal police forces

the level of search and seizure powers for uniformed personnel

the level of emergency response required by the organization

certification requirements by the federal government for homeland security needs

Reference no: EM131397007

Questions Cloud

Difference between positional power and personal power : You are a new supervisor (you have been there 2 weeks) at a large organization that develops technology for the military. You are retired military and just finished your Bachelor’s Degree in Management. What is the difference between positional power..
Develop an influence diagram and a decision tree : Develop an influence diagram and a decision tree for this situation. What roles do the two diagrams play in helping to understand and communicate the structure of this decision
Does the data appear to follow a straight line : Plot the scatter diagram when X = life expectancy and Y = crude birth rate and fit a regression line.- Does the data appear to follow a straight line?
Calculate gross patient revenue and net patient revenue : Calculate gross patient revenue, deductions from gross patient revenue, net patient revenue, total expenses, and excess of revenues over expenses.
Give the answer of muliple choice question : A company decides to plant bushes with sharp thorns on the side of their property facing a field..A security department at a private hospital that is staffed by part time security officers would most likely be classified as a  security service orga..
Determine the probability that exactly : A quality control engineer at a GE lightbulb plant finds that 1 % of its bulbs are defective. Determine the probability that exactly two of the next six bulbs made are defective.
Determine the number of different ways : They are considering 5 different sofas , 2 different chairs, and 6 different tables. They plan to select one item from each category. Determine the number of different ways they can select the furniture.
Constructing a mathematics test : A teacher in constructing a mathematics test consisting of 10 questions. She has a pool of 28 questions, which are classified by level of difficulty as follows: 6 difficult questions, 10 average questions, and 12 each questions.
Equation of the line : Write the equation of the line that goes through the point (-3,-6)and is parallel to the line-x+3y=-0.5.

Reviews

Write a Review

Other Subject Questions & Answers

  The advantages of using the internet

A hobby that I enjoy is using the computer. A great part of my time is browsing the Internet to connect internationally. According to the Internet usage statistic, seventy percent of Americans use the Internet everyday for many purposes. It makes me ..

  Naturalistic observations and evaluation

Naturalistic Observations and Evaluation

  How participation in sports illustrates connections

Describe how participation in sports illustrates connections between motor, cognitive, and social development

  Identify two people you would like to interview to get views

Write two two-tailed hypotheses that relate two variables in which you have an interest in exploring. For each hypothesis, you should use different variables. Identify two people you would interview to get views relevant to the research question,..

  Discuss topics such as global hip hop and visual art

Discuss the topics such as: global hip hop; hip hop influence in film, visual art, or fashion; legal issues in hip hop (intellectual property, rap lyrics as evidence in court cases).

  Movement toward the constitutional convention

The issue that finally touched off the movement toward the Constitutional Convention was

  Clearly describing examples of possible media and technology

Clearly describing examples of possible media and technology that could occur in the future? Clearly comparing those futuristic examples to media and technology available in the present?

  Compare garavan and mccracken and wallace models

Compare and contrast Garavan's (1991) and McCracken and Wallace's (2000) models of Strategic SHRD and discuss how these can influence the future direction of the organisation in light of the above proposition

  Hydrologic cycle and various methods of water use

Examine the hydrologic cycle and various methods of water use and management. What changes might occur in the hydrologic cycle if our climate were to warm up or cool down significantly?

  Could americans make such adjustments

How could the surveillance society liberate a culture from antiquated norms or push cultural consensus toward a new morality based on actual harm as opposed to group preferences, opinions or traditions?

  Accept the consulting assignment

You promised yourself that because your father died of lung cancer, you would never work for a tobacco company. Is there a way that you can accept the consulting assignment and still keep your promise to yourself? How will you handle this dilemma ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd