What process does a security manager use in establishing priorities in the protection of assets?
What process does a security manager use in establishing priorities in the protection of assets?A . Audit surveyB . Security surveyC . Risk analysis or assessmentD . Inspection reviewE . Both b and cF . All of the aboveView AnswerAnswer: E
The rule that states that approximately one in ten applications will have major omissions, which will require going back to the applicant, is called:
The rule that states that approximately one in ten applications will have major omissions, which will require going back to the applicant, is called:A . The Rule of TenB . The Rule of NineC . The 1-10 RuleD . The Verification RuleE . Sullivan's RuleView AnswerAnswer: A
The Secretary of Defense is not authorized to act on behalf of the following agency or department in rendering industrial security services:
The Secretary of Defense is not authorized to act on behalf of the following agency or department in rendering industrial security services:A . Department of CommerceB . Central Intelligence AgencyC . Department of JusticeD . Department of LaborE . None of the aboveView AnswerAnswer: B
A sentry dog normally does not perform as well at:
A sentry dog normally does not perform as well at:A . Radar sitesB . WarehousesC . Gasoline storage areasD . Ammunition storage areasE . Offices containing classified materialsView AnswerAnswer: C
Which of the following is not a correct statement as a general rule involving the protection of proprietary information?
Which of the following is not a correct statement as a general rule involving the protection of proprietary information?A . As a class, employees are the largest group of persons bound to secrecy because of their status or relationshipB . By operation of common law, employees are presumed to be...
Hashish mainly comes from:
Hashish mainly comes from:A . PeruB . ChileC . ColombiaD . South AfricaE . The Middle EastView AnswerAnswer: E
Background investigations of an applicant should:
Background investigations of an applicant should:A . Be based on the application and an interview record formB . Be done by a carefully screened investigatorC . Be conducted without any prior contact from the applicant by the investigatorD . All of the aboveE . None of the aboveView AnswerAnswer: D
A microphone that requires no power source, is very small, and is difficult to detect has the characteristics of a(n):
A microphone that requires no power source, is very small, and is difficult to detect has the characteristics of a(n):A . Contact microphoneB . Parabolic microphoneC . Dynamic microphoneD . Infinity microphoneE . None of the aboveView AnswerAnswer: C
Which of the following is not true in regard to establishing and identifying personnel to control movement?
Which of the following is not true in regard to establishing and identifying personnel to control movement?A . The identification card should be designed as simply as possible.B . Detailed instructions should be disseminated as to where, when, and how badges should be worn.C . Procedures should be designed to...
Which of the following should be part of an effective information security program?
Which of the following should be part of an effective information security program?A . Pre-employment screeningB . Nondisclosure agreements from employeesC . Employee awareness programsD . Policy and procedural statements on the recognition, classification, and handling of sensitive informationE . All of the aboveView AnswerAnswer: E