EXAM Q (FOR magz64)

EXAM Q (FOR magz64)

All of the following are physical threats to information except:system failuresnatural disastershuman errormalicious actsA company decides to plant bushes with sharp thorns on the side of their property facing a field. This would be an example of:perimeter access controlsecurity planning by environmental designcrime prevention through environmental designagricultural environmental protectionThe risk formula is based on:threat and vulnerabilityvulnerability and countermeasuresthreat and mitigationvulnerability and mitigationA security department at a private hospital that is staffed by part time security officers would most likely be classified as a _____ security service organization.Level IVLevel IIILevel IILevel IThe type of information that has special value to organizations is:employee handbooksintellectual capitalintellectual propertyaccount receivable recordsWhich of the following terms is applied to civil cases involving tort liability when a security officer unreasonably detains an individual without justification?malicious prosecutionfalse imprisonmentfalse arrestdefamationOperational plans would include all of the following except:organization and authorityMission, Vision, Valuesstrengths, weaknesses and opportunitiesequipment and weaponsThe vast majority of security services personnel in the private sector are employed in:executive protectioncontract watch and guardinvestigationstransport and cash managementRisk to an organization includes:reputationpeoplecustomers and clientsequipmentall of the aboveThe type of malicious event typically used by disgruntled employees is a:megabytelogic bombTrojan horseCountermeasureThe following nation has not adopted “smart card” technology for credit transactions:ChinaEnglandUnited StatesIndiaOperationally, an enterprise security risk management system would be supervised by:the CEOChairman of the BoardChief Security OfficerChief Financial OfficerThe most notable development that occurred after 9.11 for security services was:the re-organization of various federal law enforcement agenciesthe passage of various anti-crime legislative actsthe merger of state and federal agencies into national homeland security operationsthe takeover of security functions by state governmentsthe increase of powers given to private security operationsA private employer of security personnel could be held liable and required to pay damages for the conduct of its employees based upon:negligent hiringnegligent trainingnegligent supervisionall of the aboveHoneywell, Siemens, and Simplex are examples of companies that provide:executive protectionalarm servicescontract watch and guardinvestigationscash managementFire safety programs include all of the following except:installation of alarm and fire suppression systemtraining for employees on how to react when an alarm is soundedreview of building codes for fire safetyreliance on local fire departments for fast and rapid responseThe major weakness of most CCTV systems is:the inability to detect human faces at nightthe inability to observe crime activity in progress if there are multiple sitesthe lack of digital imaging in most network systemsthe limits on placing cameras in hidden areasThe software technology that enables a criminal to hide data inside another file is:Trojan horsewormsteganographyspywareGovernmental powers include all of the following except:evacuation of peoplecustodial intervention for people who are a threat to themselvesthe use of deadly physical force and to carry firearmsplanning for disastersissuance of motor vehicle summonsesThe trial court in the U.S. court system that handles criminal cases is the:Supreme CourtCourt of AppealsCourt of International TradeDistrict CourtAll of the following contributed to the development of national security service organizations in the 19th century except:railroad constructiontelegraph and telephone expansionintelligence operations during the civil warstate border control operationsthe industrial revolutionA manager who wants to review the agency’s missions and goals for the future would engage in what type of planning:strategicoperationalshort termemergencyThe risk management process is composed of which of the following correct steps:assessment, prioritization of assets/risks, mitigation, operations planprioritization of assets/risks, operations planning, assessment, mitigationmitigation, assessment, prioritization of assets/risks, mitigatione. asset evaluation, assessment, mitigation, operations planThe technology that enables computers to synchronize with data on PDAs is:encryptionspywareimage masteruniversal serial busThe agency mainly responsible for the enforcement of laws and security on the American frontier during the 19th Century was:Alcohol, Tobacco and FirearmsSecret ServiceCustomsMarshals ServiceRangersSecurity equipment consultants must be chosen on which set of guidelinescost, track record, reliability, contract needtrack record, client satisfaction, cost, government clearanceclient satisfaction, service and maintenance, company history, track recordcost, customer satisfaction, state review, state licenseIn Gap Analysis, the objective is to reduce ____________between the goal and the present status or state of affairs.ambiguityimpedimentsoutcomesbenchmarksIn the prioritization phase, a value must be placed on:assets and probability or possibilities assigned to threatscountermeasures related to vulnerabilitiesthe role of liability if a catastrophic event were to occurprofit and loss factors if the business were to shut downThe liability concept concerning whether an employer can be held liable for the conduct of its employee is known as:stare decisisconstitutional tortvicarious liabilitycommon lawMalicious software code that is distributed via the Internet and that infects computers in a manner that impairs the performance of programs or destroys data is known as a:virusspywarekeyloggersteganoidIf a person performing security services is found negligent that means that he or she:was recklessacted intentionallyfailed to exercise reasonable carewillfully caused injuryTo deal with public area security issues, many cites, shopping malls, and schools have installed _________________ systems to increase security.CCTVbiometric securityInternet communications systemssmart card technologyThe category of laws that define legal rights and responsibilities is:substantive lawcriminal lawprocedural lawpublic lawThe United States Secret Service was originally formed to deal with:terroristsexecutive protectioncounterfeit moneymilitary intelligenceLegal limitations imposed upon the performance of security functions usually are found in:a constitutionadministrative regulationscommon law traditionsadministrative decisionsWhich of the following terms describes the identification of weaknesses in an organization’s security:vulnerability assessmentcost benefit analysisthreat analysisasset valuationAll of the following are important for the selection and implementation of countermeasures except:Regular inspections of telecommunications equipment.Obtaining credible and trusted serve providers for technical countermeasures.Performing periodic scans for unauthorized wireless network devices.Undertaking the selection of countermeasures based on the lowest cost.A global trend is for many American security companies to:become subsidiaries or major holdings of international security conglomeratesprovide security protection for federal and state agenciestake over investigations involving industrial espionage in Europe and Asia.provide training on counter-terrorism issues to private companies in Europe and AsiaFusion centers were created to:provide security services to federal facilitiesinitiate communications facilities to all federal agenciesgather and distribute intelligence on major crimes and terrorism for federal, state, and local agenciesmonitor Internet transactions between the U.S. and foreign countriesThe major issue to determine if security personnel should be armed is:the response level of municipal police forcesthe level of search and seizure powers for uniformed personnelthe level of emergency response required by the organizationcertification requirements by the federal government for homeland security needs