What is the biggest vulnerability of a loop system?

What is the biggest vulnerability of a loop system?A . All the detectors in an area could be disabled by interrupting the loop at the proper location B. Physical Intervention C. Power interruption D. Detectors not being recorded on a systemView AnswerAnswer: A

December 18, 2022 No Comments READ MORE +

What are the three ways of verifying personnel entry?

What are the three ways of verifying personnel entry?A . Who you are (role) What you know (PIN, password) What you have (badge) B. Who you are (role) What you know (PIN, password) What you are (biometrics) C. What you have (credential) What you know (PIN, password) What you are...

December 18, 2022 No Comments READ MORE +

During a trip with a principle, what are the three key concepts for an executive protection (EP) specialist to remember?

During a trip with a principle, what are the three key concepts for an executive protection (EP) specialist to remember?A . Keep a low profile Stay away from problem areas and situations Know what to do if trouble arises B. Keep a low profile Stay away from problem areas and...

December 17, 2022 No Comments READ MORE +

In its basic sense, the investigative process reflects

In its basic sense, the investigative process reflectsA . A simple statement of all the abstracts encountered B. The mindset of the investigator C. Precise controlled examination D. Absolute goal-oriented inquiryView AnswerAnswer: A

December 17, 2022 No Comments READ MORE +

Who is the person responsible for maintaining and archiving closed case files, including all notes, reports and summaries?

Who is the person responsible for maintaining and archiving closed case files, including all notes, reports and summaries?A . The custodian of record B. The security manager C. The HR Rep D. The Project ManagerView AnswerAnswer: A

December 17, 2022 No Comments READ MORE +

What are the three most common methods of training protection dogs?

What are the three most common methods of training protection dogs?A . Positive reinforcement (praise) Compulsion (negative corrections) Inducement (toys, foods) B. Positive reinforcement (praise) Compulsion (negative corrections) Punishment (corrections) C. Positive reinforcement (praise) Communication (talking) Inducement (toys, foods) D. Repeated Performance (repeat exercise) Compulsion (negative corrections) Inducement (toys, foods)View...

December 17, 2022 No Comments READ MORE +

What are the five Ds of security?

What are the five Ds of security?A . Divide Deny Detect Delay Destroy B. Defend Deny Detect Delay Destroy C. Define Deny Detect Delay Destroy D. Deter Deny Detect Delay DestroyView AnswerAnswer: D

December 17, 2022 No Comments READ MORE +

Field welds and brazing on factory boxes, enclosures, and conduits should be coated with what?

Field welds and brazing on factory boxes, enclosures, and conduits should be coated with what?A . Cold galvanized paint containing at least 95 percent zinc by weight B. Cold galvanized paint containing at least 75 percent zinc by weight C. Cold galvanized paint containing at least 65 percent zinc by...

December 17, 2022 No Comments READ MORE +

What is the ‘broken windows’ theory?

What is the ‘broken windows’ theory?A . The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is...

December 17, 2022 No Comments READ MORE +

What is a Trademark

What is a TrademarkA . Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source. B. Legal protection for a property right granted to an inventor to exclude others from making, using, offering for sale, or...

December 17, 2022 No Comments READ MORE +