Those who are delegated authority in the direct chain of command to accomplish specific organizational objectives are known as:
Critical process recovery requires an assessment of resources.
Document the events, circumstances, and chronology and prepare a “lesson learned” review are the primary parts of:
_______________ of risk involves planning for an eventual loss without benefit of insurance.
In which ingredients are added to the loss prevention function one by one as the need arises, without a comprehensive plan, is called:
The system which provides an extra measure of security by requiring that exchanges take place at the entrance to each restricted area within the controlled area is called:
Which of eth following is NOT the type of insurance?
What is a feeling of responsibility and respect that develops during an individual’s formative years and is subconscious?
Taking personal property in such a way that the plaintiff’s use or right of possession of chattel is restricted is called:
Which of the following is NOT included in the pass systems?
The computers those are capable of great processing speed and data storage, allowing multiple users to utilize the system simultaneously is called:
The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?
The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:
WANs used which protocol developed by the Consultative Committee for International Telephone and Telegraph.
Who developed Ethernet?
Unintentional access to software code is referred to as:
What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?
When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:
Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?
A device that sends a signal about whatever is sensed to some other location is called:
Which of the following is Correct?
What involves walking or riding a given route to observe the condition of the facility?
Private security functions are not essentially client orientated; public law enforcement functions are society or community oriented.
In its organizational functions, security encompasses which basic activities with varying degrees of emphasis?
What is a major management function in business worldwide?
A series of menus from which a person can access virtually any type of textual information is known as:
A solicitation by police officers is another charge that may be leveled against security officers is called:
_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.
______________ has been defined as the impact of a loss as measured in dollars.
Which liability is of concern to enterprises that contract or employs security services and is an indirect legal responsibility?
Under 50/50 rule of comparative negligence, the plaintiff can collect for damages if he or she was responsible for more or less than 50 percentage of the negligence.
What refers to the number of employees over which any individual can exercise direct supervision effectively?
A good risk management program involves:
The recommendations of the Task Force on private security include which one of the following?
Who must regularly study and analyze the channels of communication to be certain that the input they receive is accurate, relevant, timely, concise and informative?
Which of the following is NOT the category of signaling systems?
The dollar loss is not simply the cost of the item lost but also includes:
Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.
Reserves are the people standing by in the event that assistance is needed by security personnel on fixed posts or patrol; duty.
A complete contingency planning program has which of the following major elements?
When using ____________, computers must ensure that there is no traffic on the network before they are allowed to transmit information.
_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.
Which of the following is NOT the distinct action that fall into invasion of privacy?
The degree to which a manager or supervisor is able to delegate responsibility rather than trying to do everything personally is a good measure of managerial ability.
In which approach of comparative negligence, the plaintiff may collect something for injuries even if he or she was primarily responsible for the injuries?
A good hybrid security operation consists of which component?
What focus on legal principles and theories along with cases in which such principles predominate?
An event that is possible but uncertain in terms of occurrence or that is likely to happen as an adjunct to other events is called:
WANs also allow multiple computers to share the same communication line, as is possible with LANs.
Material Safety Data Sheet (MSDS) that must be available for each chemical at the work site contains which sections?
Under the principle of agency law, such an assignment transfers the liability for the service from the corporation to the independent contractor with obligations that some cannot be entirely transferred, is called:
When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:
____________ builds on confusion when two or more people take advantage of their positions and the confusion to steal.
Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.