Professional Documents
Culture Documents
BPP Answer Paper
BPP Answer Paper
Exercise‐1
The following questions has been designed based on POA, Security Management, Chapter 1,
Administrative Management Principles
1. By using what kind of knowledge, security managers can organize their efforts in a way that best
supports the overall vision and mission of their organization?
Ans: Business knowledge. (POA, Security Management, 2012, ch1, p1).
2. Who are those that are recognized as the effective security manager within the organization?
Ans: Those that are recognized within their organization as business partners. (POA, Security
Management, 2012, ch1, p1).
3. At some point a business must determine the type of product or service to sell and how to
develop, deliver, and finance that output. To manage this process successfully, what managers
and owners must employ?
Ans: Practices that support the goals of their business. (POA, Security Management, 2012, ch1, p1)
4. What security managers must develop that define success and support business decisions?
Ans: Metrics. (POA, Security Management, 2012, ch1, p1).
5. To be successful in business, what managers should understand?
Ans: The types of customers they serve, the financial requirements of the business, and ways to
coordinate staff efforts. (POA, Security Management, 2012, ch1, p2).
6. What kind of tool can be studied to determine whether the business processes accurately reflect
the organizational strategy?
Ans: Key metrics and performance indicators. (POA, Security Management, 2012, ch1, p3).
7. Feedback from what kind of tools allows an organization to change the implementation of the
strategy or even shift the strategic focus itself?
Ans: Basing on the feedback from key metrics and performance indicators. (POA, Security Management,
2012, ch1, p3).
8. What a business must understand and what need to create that support it?
1 ©All right reserved by IQC Security & Loss Prevention Consultancy
Ans: A business must understand its purpose and create management practices that support it. (POA,
Security Management, 2012, ch1, p3).
9. What serves as the foundation for developing business processes?
Ans: The organizational strategy. (POA, Security Management, 2012, ch1, p3).
10. What basically defines why the business exists and how it will maintain itself as a profitable,
viable entity?
Ans: The organizational strategy. (POA, Security Management, 2012, ch1, p3).
11. While developing strategy, what is first step to understand?
Ans: The first step is to understand the business and where it needs to be in the future. (POA, Security
Management, 2012, ch1, p4).
12. How it is possible to tailor daily operations of a business to support the organizational strategy?
Ans: By applying management principles. (POA, Security Management, 2012, ch1, p5).
13. What kind of test the objective must pass through?
Ans: A test called SMART (Specific, Measurable, Attainable, Relevant, and time‐bund). (POA, Security
Management, 2012, ch1, p5).
14. To meet its objectives and implement its strategy, a business must pay attention to its primary
resource. What is the primary resource?
Ans: Its people. (POA, Security Management, 2012, ch1, p5)
15. What can help communicate the organizational strategy?
Ans: The vision, mission and objectives. (POA, Security Management, 2012, ch1, p5).
16. What mission of the business specifies?
Ans: The mission of the business specifies its types of products or services, level of quality, and other
tangible aspects of the business and its plans. (POA, Security Management, 2012, ch1, p5).
2 ©All right reserved by IQC Security & Loss Prevention Consultancy
17. What is the most visible component of the HR department?
Ans: Staffing. (POA, Security Management, 2012, ch1, p6).
18. How an effective job requirements analysis can be done?
Ans: Through candidate profiles, and effective interviews and evaluations. (POA, Security Management,
2012, ch1, p6).
19. What kind of requirements the job requirements analysis must address?
Ans: The job requirements analysis addresses both direct and indirect requirements. The direct
requirements are those that the candidate must meet to understand and function in the position. The
indirect requirements are skills that will increase the candidate’s likelihood of success. (POA, Security
Management, 2012, ch1, p6).
20. How staffing decision in an organization should be measured?
Ans: Against a detailed job requirements analysis. (POA, Security Management, 2012, ch1, p6).
21. What type of analysis should weigh which skills are most valuable for the position?
Ans: The job requirements analysis. (POA, Security Management, 2012, ch1, p7).
22. For the position filling in an organization, what elements the heads of security need to
communicate to the HR staff responsible for recruiting?
Ans: About the primary security function requirements and other skills requirements. (POA, Security
Management, 2012, ch1, p7).
23. How to appeal to the best candidates?
Ans: To appeal to the best candidates, a company must impress them just as much impress the
company. (POA, Security Management, 2012, ch1, p7).
24. While conducting interview of candidate, what the interviewer should examine from a candidate?
Ans: The candidate’s objective capabilities and subjective fit with the team the candidate would work
with. (POA, Security Management, 2012, ch1, p7).
25. What is the best way to recruit a good candidate?
Ans: Internal recommendations. (POA, Security Management, 2012, ch1, p7).
3 ©All right reserved by IQC Security & Loss Prevention Consultancy
26. What the HR department must establish to outline the direction how business will be conducted
at the organization?
Ans: Must establish policies and procedures. (POA, Security Management, 2012, ch1, p8).
27. When developing policies in an organization, what is useful to do?
Ans: It is useful to work closely with the managers whose teams will be most affected by the policies.
(POA, Security Management, 2012, ch1, p8).
28. What can help to prevent confusion within the organization?
Ans: Clearly articulating company procedures. (POA, Security Management, 2012, ch1, p8).
29. What should reflect the ideal functionality of the organization?
Ans: The policies and procedures (POA, Security Management, 2012, ch1, p9).
30. What policies cover in an organization?
Ans: Policies cover items that the organization monitors and expects employees to conform to. (POA,
Security Management, 2012, ch1, p8).
31. What procedure deal in an organization?
Ans: In an organization, procedures deal with specific items‐for example, how an employee should
handle setting up vacation time. (POA, Security Management, 2012, ch1, p8).
32. What nature of training help employees to do their jobs better?
Ans: Internal training. (POA, Security Management, 2012, ch1, p9).
33. The metrics for evaluating employees should align closely with what element of the organization?
Ans: With the organizational strategy. (POA, Security Management, 2012, ch1, p9).
34. What employers must to do to aid employee development and retention?
Ans: Employers must review and reward employee performance and provide training mechanisms for
employee growth. (POA, Security Management, 2012, ch1, p9).
35. Why companies use performance metrics and training modules?
Ans: To foster employee development. (POA, Security Management, 2012, ch1, p9).
4 ©All right reserved by IQC Security & Loss Prevention Consultancy
36. How employees should be measured?
Ans: How they do their current jobs and how well they contribute to the growth of the company as a
whole. (POA, Security Management, 2012, ch1, p10).
37. What is the second most valuable resource in an organization after its employees?
Ans: Corporate knowledge. (POA, Security Management, 2012, ch1, p10).
38. What can enable one department to learn from the processes, technologies, and ideas of
another?
Ans: Cross‐unit knowledge sharing. (POA, Security Management, 2012, ch1, p10).
39. What can be the metrics for assessing employee’s overall contribution to the company?
Ans: Metrics for assessing employee’s overall contribution to the company include: 1‐ extra sales, extra
hours, and work on several projects, 2‐ work on tasks outside the position requirements, 3‐ contribution
toward improvements in the business process, 4‐ leadership. (POA, Security Management, 2012, ch1,
p10).
40. What can be the metrics to identify how well employees are doing their current jobs?
Ans: Metrics for assessing how well employees are doing their current jobs include: 1‐ work quality, 2‐
performance on time, 3‐ performance within budget, 4‐ meeting of other requirements of the position.
(POA, Security Management, 2012, ch1, p10).
41. Central knowledge systems can be used as a tool of measurement and what it enables us to do in
the organization?
Ans: It enables an organization to identify problems and spot opportunities to cut costs, increase
efficiency, or expand the business. (POA, Security Management, 2012, ch1, p11).
42. What is the initial step in determining right structure for an organization?
Ans: The initial step is to identify the essential business units. (POA, Security Management, 2012, ch1,
p11).
43. In an organization, if the organizational strategy emphasizes volume over profitability, then what
should be metrics of measurement?
Ans: An important metric will be growth in revenue. (POA, Security Management, 2012, ch1, p11).
5 ©All right reserved by IQC Security & Loss Prevention Consultancy
44. Through what management practices in an organization are largely expressed?
Ans: Through human resource management, knowledge management, and business structure.
Exercise‐2
The following questions has been designed based on POA, Security Management, Chapter 2, Financial
Management
1. What is the basis of financial management?
Ans: Understanding the accounting principles used in generating financial reports. (POA, Security
Management, 2012, ch2, p13).
2. What is possible to develop from the financial analysis?
Ans: It is possible to develop budgets and set expected goals for revenue or return on investment (ROI).
(POA, Security Management, 2012, ch2, p13).
3. What is the first step to identify in establishing a financial strategy?
Ans: The first step is to identify expected margins, or the profit that businesses generally make. (POA,
Security Management, 2012, ch2, p14).
4. How a company can improve margins?
Ans: It can reduce costs or increase the price of its product or service. (POA, Security Management,
2012, ch2, p14).
5. What kind of difficulties a company might face if its growth is funded from internal cash reserves?
Ans: That could limit the ability of an organization to pay bills if costs exceed revenues. (POA, Security
Management, 2012, ch2, p14).
6. How to make financial decisions and project returns?
Ans: Through analysis of financial statements. (POA, Security Management, 2012, ch2, p14).
7. What is the purpose of generally accepted accounting principle (GAAP)?
Ans: The purpose of GAAP is to establish and maintain a standard for financial reporting that can be
used across all organizations. (POA, Security Management, 2012, ch2, p15).
6 ©All right reserved by IQC Security & Loss Prevention Consultancy
8. What are those three financial reports or statements have become accepted as standard?
Ans: The income statement, balance sheet, and statement of cash flows. (POA, Security Management,
2012, ch2, p15).
9. What are the costs included in the costs of goods?
Ans: Costs of goods sold include the cost of creating a product or service, accounting for materials,
labor, and other costs. (POA, Security Management, 2012, ch2, p17).
10. What the balance sheet summarizes?
Ans: The balance sheet summarizes an organization’s investing and financing. (POA, Security
Management, 2012, ch2, p17).
11. When the shareholders are accountable for the extended liability?
Ans: If the liabilities of an organization far outweigh the assets, then shareholders are accountable for
the extended liability. (POA, Security Management, 2012, ch2, p17/18).
12. What do you mean by retained earnings?
Ans: Retained earnings equal the amount of net income that is reinvested in an organization. (POA,
Security Management, 2012, ch2, p18).
13. How it is possible to determine what a company owns and what it owes in the short term and
long term?
Ans: Through understanding the asset and liability mix. (POA, Security Management, 2012, ch2, p17).
14. What is the equation of balance sheet?
Ans: The equation of balance sheet: asset equal to liabilities plus shareholder equity. (POA, Security
Management, 2012, ch2, p17).
15. How accumulated depreciation can be defined?
Ans: Accumulated depreciation defines as buildings and equipment age, they begin to lose value. The
loss of value with each year is captured in accumulated depreciation to more accurately reflect the book
value of an asset. (POA, Security Management, 2012, ch2, p18).
7 ©All right reserved by IQC Security & Loss Prevention Consultancy
16. What kind of cash flow can be found in a cash flow statement?
Ans: The cash flow statement shows: 1‐ net operating cash flow, 2‐ net investing cash flow, 3‐ financial
cash flow. (POA, Security Management, 2012, ch2, p20).
17. What financial tool provides insight into the company’s use of profit to increase shareholder
equity?
Ans: The balance sheet. (POA, Security Management, 2012, ch2, p20).
18. How it is possible to identify where cash is being generated to cover business operations?
Ans: By understanding basic inflows and outflows of net operating cash flow, net investing cash flow and
financing cash flow. (POA, Security Management, 2012, ch2, p20).
19. What is return?
Ans: Return is the amount of money an investment choice will give back to an investor. (POA, Security
Management, 2012, ch2, p21).
20. What is risk?
Ans: Risk is an estimate of the probability that investors will again or lose money. (POA, Security
Management, 2012, ch2, p21).
21. What can be helpful for comparing performance against expected values in an industry or against
an organization’s historical performance?
Ans: The ratios of financial statements. (POA, Security Management, 2012, ch2, p21).
22. What are the two earning related ratios are commonly examined in financial analysis?
Ans: Two earning related ratios are commonly examined in financial analysis which are: 1‐erning per
share (EPS), 2‐ price to earnings (P/E). (POA, Security Management, 2012, ch2, p22).
23. When an organization is more profitable?
Ans: When the larger the margin of net income. (POA, Security Management, 2012, ch2, p22).
24. When it can be said that the company is more efficient to producing a product?
Ans: When the higher the gross profit margin. (POA, Security Management, 2012, ch2, p22).
8 ©All right reserved by IQC Security & Loss Prevention Consultancy
25. What the operating margin demonstrates in a company?
Ans: In an organization, operating margin demonstrates the company’s overall operating efficiency in
producing and selling a product. (POA, Security Management, 2012, ch2, p22).
26. What is the difference between return on assets and return on equity?
Ans: Return on assets (ROA) measures how well a company makes profit on assets it already owns;
return on equity (ROE) measures a company’s effectiveness at using loans to generate profit. (POA,
Security Management, 2012, ch2, p22).
27. Name the different measures of margins?
Ans: There are different measures of margins which are: 1‐ gross profit margin, 2‐ operating margin, 3‐
net profit margin. (POA, Security Management, 2012, ch2, p22).
28. What is called leveraging?
Ans: The practice of borrowing capital to purchase assets that can increase revenue is called leveraging.
(POA, Security Management, 2012, ch2, p23).
29. Which ratio is useful in determining whether an organization is fairly valued and also used to
value private shares if an investor is thinking of purchasing an interest in a private organization?
Ans: The price to earnings ratios. (POA, Security Management, 2012, ch2, p24).
30. What is the primary limitation of financial statement analysis?
Ans; It does not directly consider changes in market conditions. (POA, Security Management, 2012, ch2,
p26).
31. While doing the financial risk analysis what are the risk rations are used?
Ans: In the financial risk analysis, several risk ratios are used which are: 1‐ current ratio, 2‐ quick ratio, 3‐
debt to equity ratio. (POA, Security Management, 2012, ch2, p25).
32. What are the limitations of financial statement analysis?
Ans: The limitations of financial statement analysis are: 1‐ it does not directly consider changes in
market condition, 2‐all organizations operate differently, 3‐ all organizations target different markets, 4‐
the financial ratios are derived from numbers presented in financial reports, and those report must be
accurate for the ratios to have any meaning. (POA, Security Management, 2012, ch2, p26).
9 ©All right reserved by IQC Security & Loss Prevention Consultancy
33. What may be the cause for continued declined in profit margin?
Ans: May be a result of poor economic conditions rather than poor company operations. (POA, Security
Management, 2012, ch2, p26).
34. Which ratios examine the company’s ability to cover short‐term obligations?
Ans: If the current ratio is greater ratio is greater than one, the company has the ability to cover all its
current liabilities with its current assets. Current ratio. (POA, Security Management, 2012, ch2, p25).
35. Which ratio is also called as acid test?
Ans: The quick ration is also known as the acid test. (POA, Security Management, 2012, ch2, p25).
36. What the financial analysis basically focuses?
Ans: Financial analysis focuses on whether a company will have the ability to cover expenses and
operating costs in the near term as well as long term. (POA, Security Management, 2012, ch2, p25).
37. What is the more practical strategy for developing budget?
Ans: A more practical strategy for developing budget is a combination of both where the lowest level of
input will occur at the divisional or department level so that executive management can determine a
realistic budget that is in line with the overall financial objectives of the company. (POA, Security
Management, 2012, ch2, p27).
38. What businesses need to generate to meet budget requirements?
Ans: To meet budget requirements, businesses often need to generate a certain amount of revenue as
well as limit spending to predetermined amount. (POA, Security Management, 2012, ch2, p27).
39. What is one of the main purpose for understanding financial accounting and financial analysis?
Ans: To establish budgets. (POA, Security Management, 2012, ch2, p27).
40. What is zero‐based budgeting?
Ans: Zero‐based budgeting is a process wherein funds are placed in a budget only to extent that planned
expenditures are justified in detail; (POA, Security Management, 2012, ch2, p27).
10 ©All right reserved by IQC Security & Loss Prevention Consultancy
41. What is the effective way to set value of line items?
Ans: An effective way to set the value of line items is to look at each budget expense as an investment
and then calculate the expected return on that investment. In other words, one looks at the benefit of
the investment divided by the cost‐in simpler terms, cost/benefit. (POA, Security Management, 2012,
ch2, p28).
42. What is the effective way to compare the desirability of different ways of spending?
Ans: Calculating the return on investment (ROI). (POA, Security Management, 2012, ch2, p28).
43. What is the benefit by communicating the strategy to employees, investors, vendors, suppliers,
and other stakeholders?
Ans: It boosts confidence and makes it possible for all to focus on creating success from the strategic
direction. (POA, Security Management, 2012, ch2, p30).
44. Write the equations of ROI?
Ans: ROI=Investment value at end of period/ investment value beginning of period‐1; ROI= Initial
investment plus interest earned (or lost)/Initial investment‐1(POA, Security Management, 2012, ch2,
p28).
45. The implementation of financial strategy depends greatly on what?
Ans: Depends greatly on clear communication of the strategy, it purposes, and its expected results.
(POA, Security Management, 2012, ch2, p30).
46. How the return on the implementation of an effective security countermeasure can be measured?
Ans: By applying efficiency versus cost, or cost versus benefit, ratio to show the long‐range cost savings
to the company. Also in some cases the insurance premiums are lower when risk decreases. (POA,
Security Management, 2012, ch2, p29).
47. The budget of a company must be aligned with what?
Ans: With the company’s financial strategy. (POA, Security Management, 2012, ch2, p30).
48. Why establishing a solid strategy is essential for an organization?
Ans: In order to keeping an organization competitive and to able to adapt to changes in the
marketplace. (POA, Security Management, 2012, ch2, p30).
11 ©All right reserved by IQC Security & Loss Prevention Consultancy
49. At department and unit levels, how budget items are listed?
Ans: Budget items are listed in greater detail. (POA, Security Management, 2012, ch2, p29).
50. How any financial strategy must be implemented and overseen to be effective?
Ans: With appropriate controls. (POA, Security Management, 2012, ch2, p30).
Exercise‐3
The following questions has been designed based on POA, Security Management, Chapter 3, Standards
in Security (Page no 42 to 58)
1. What the term management system refers?
Ans: The term management system refers to the organization’s method of managing its processes,
functions, or activities. (POA, Security Management, 2012, ch3, p42).
2. What tool provides a factual basis for decision making and a system for continual improvement?
Ans: A management system. (POA, Security Management, 2012, ch3, p43).
3. What is the most famous management systems standard?
Ans: ISO 90001:2008. (POA, Security Management, 2012, ch3, p42).
4. How a management system helps to an organization?
Ans: Management systems are tools to help an organization meet its goals, whether in terms of quality,
environmental concerns, safety, security, preparedness, or continuity. (POA, Security Management,
2012, ch3, p43).
5. The most management system is based on which model?
Ans: Based on the plan‐Do‐Check‐Act (PDCA or Deming Cycle) model. (POA, Security Management, 2012,
ch3, p43).
6. Which are the really issues of making the organization successful?
Ans: Management will better understand security issues, and security professionals will better
understand management issues, which are really the issues of making the organization successful. (POA,
Security Management, 2012, ch3, p44).
12 ©All right reserved by IQC Security & Loss Prevention Consultancy
7. What a management systems standard is likely to lead?
Ans: Some specific outcomes that a management systems standard is likely to lead to include better
organizational performance through improved capabilities, strategic alignment of improvement
activities at all levels of the organization, the flexibility to react quickly to opportunities and a changing
environment and optimization of resources.(POA, Security Management, 2012, ch3, p45).
8. How the process should be approached in an organization?
Ans: From a business point of view with a continual improvement perspective. (POA, Security
Management, 2012, ch3, p57).
9. How it is possible to focus on problems that are manageable and for which one can effectively
develop a system?
Ans: By understanding and prioritizes the issues most important to the organization (POA, Security
Management, 2012, ch3, p57).
10. What emphasied by plans for response management programs?
Ans: Reducing an incidents impact and quickly returning to full operation. (POA, Security Management,
2012, ch3, p58).
11. What state and constitute a commitment to the protection of critical assets as well as
commitment to continuous improvement?
Ans: The security policy. (POA, Security Management, 2012, ch3, p58).
12. What is emphasized by plans for security management programs?
Ans: Incident prevention. (POA, Security Management, 2012, ch3, p58).
13 ©All right reserved by IQC Security & Loss Prevention Consultancy
Exercise‐4
The following questions has been designed based on POA, Security Management, Chapter 4,
Introduction to Asset Protection (Page no 84 to 88)
1. In addition to technical expertise, assets protection professionals need a solid grounding in
organizational management. Success in the field which may mean saving lives and protecting
valuable assets‐ depends on the proper balance of three managerial dimensions: what are those
dimensions?
Ans: Technical expertise, management ability, and the ability to deal with people. (POA, Security
Management, 2012, ch4, p84).
2. According to the Peter Drucker, what is the first and most crucial question in defining business
purpose and mission?
Ans: Who is the customer? (POA, Security Management, 2012, ch4, p85).
3. What are the basic functions involves in managing a job?
Ans: Planning, organizing, directing, coordinating and controlling; (POA, Security Management, 2012,
ch4, p85).
4. In addition to the management functions, management should be guided by what are the
principles?
Ans: “Who is the customer?” and quality. These principles should become part of the organization’s
culture. (POA, Security Management, 2012, ch4, p85).
5. What are the important tools in crime prevention programs?
Ans: Planning, management, and evaluation (POA, Security Management, 2012, ch4, p86).
6. What do you understand by span of control?
Ans: The “span of control” principle suggests that a single person can supervise only a limited number of
staff members effectively. The specific number depends on such factors as the nature of the work and
type of organization but as a general rule one manager can effectively supervise up to 10 people. (POA,
Security Management, 2012, ch4, p87/88).
7. As a rule of thumb, where the senior security or asset protection professional should be placed
within the organization? And to whom he should report?
14 ©All right reserved by IQC Security & Loss Prevention Consultancy
Ans: Should be placed as high as possible in the structure of an enterprise and report directly to senior
or executive management. (POA, Security Management, 2012, ch4, p88).
8. What making enable a person to supervise as many as 100 people?
Ans: The introduction of IT infrastructures, use of current telecommunications technology, and
flattening of organizational pyramids. (POA, Security Management, 2012, ch4, p88).
9. What do you understand by unity of command?
Ans: Unity of command dictates that an individual report to only one supervisor. It is based on the
concept that a person cannot effectively serve the interests of two or more masters. (POA, Security
Management, 2012, ch4, p88).
10. It is whose responsibility to ensure the best performance from the unit he or she manages?
Ans: It is the supervisor’s responsibility. (POA, Security Management, 2012, ch4, p88).
11. By the nature of expertise, asset protection managers must have what kind of authority within
the organization?
Ans: Must have functional authority within the organization and be identified as part of the corporate
management team. (POA, Security Management, 2012, ch4, p88).
Exercise‐ 5
The following questions has been designed based on POA, Security Management, Chapter 5, Cost
Effectiveness and Loss Reporting (Page no 107 to 118)
1. What does it mean by cost‐effectiveness?
Ans: Cost‐effectiveness means producing good results for the money spent. To senior management,
cost‐effectiveness is the primary factor in determining the size or existence of the asset protection
program. (POA, Security Management, 2012, ch5, p107).
2. What a security manager should do to maximize cost‐effectiveness?
Ans: To maximize cost‐effectiveness, a security manager should do: 1‐ ensures that the operations are
conducted in the lease expensive, but cost effective way, 2‐maintain the lowest costs consistent with
15 ©All right reserved by IQC Security & Loss Prevention Consultancy
required operational results, 3‐ ensure that the amount of money spent generates the highest return.
(POA, Security Management, 2012, ch5, p108).
3. Why senior management will inevitably view all operations from a financial perspective?
Ans: Because the department that plays a direct role in the generation of revenue is a profit centre.
(POA, Security Management, 2012, ch5, p109).
4. Which categories of expense that security professionals must consider when developing a budget?
Ans: Salaries, operational expenses, and capital expenditures. (POA, Security Management, 2012,
ch5, p109).
5. What is the essential step in developing a department budget?
Ans: Is to review the organization’s overall strategy and goals to determine how the security budgets fits
in. (POA, Security Management, 2012, ch5, p109).
6. What return on investment measures?
Ans: Return on investment (ROI) is a standard profitability ratio that measures how much net income
the business earns for each dollar invested by its owners. Also called return on equity. (POA, Security
Management, 2012, ch5, p109).
7. Why return on investment is used to gauge?
Ans: To gauge management’s overall effectiveness in generating profits. (POA, Security Management,
2012, ch5, p109).
8. How return on investment can be measured?
Ans: ROI can be measured in time saved, improved efficiency, reduced manpower, reduced losses, lower
liability or insurance payments, or greater customer satisfaction. It all translates into an improved
bottom line over time. (POA, Security Management, 2012, ch5, p109).
9. How security metrics can be described?
Ans: Security metrics is described as the process of measuring an asset protection program’s costs and
benefits as well as its successes and failures. (POA, Security Management, 2012, ch5, p111).
16 ©All right reserved by IQC Security & Loss Prevention Consultancy
10. The first step in good security planning is performing an analysis of the potential areas of loss, their
probability, and their gravity or impact on the corporation. This data, along with what element
provides the information needed to present a security budget to senior management?
Ans: Security metrics. (POA, Security Management, 2012, ch5, p111).
11. How security managers are better able to show the cost‐effectiveness of asset protection?
Ans: Through the application of metrics. (POA, Security Management, 2012, ch5, p112).
12. What data analysis may suggest?
Ans: Data analysis may suggest whether specific security measures are effective at all. (POA, Security
Management, 2012, ch5, p112).
13. From which baseline all expense budgets are built?
Ans: Typically, a sales forecast will project sales revenue for a quarter or a year. This forecast will then
be the baseline from which all expense budgets are built. (POA, Security Management, 2012, ch5, p113).
14. When expense budgets total more than the available funds, budget reviews are conducted.
Reductions in budget are usually made by deleting what kind of expenditures?
Ans: Typically personnel and operating expenses. (POA, Security Management, 2012, ch5, p113).
15. What management strives to maintain?
Ans: Management strives to maintain the margin between gross sales and expenses, even in the face of
reduced sales. (POA, Security Management, 2012, ch5, p113).
16. What is only way operating functions can justify continued funding?
Ans: The only way an operating function can justify continued funding is to demonstrate that the real
costs to the enterprise would be greater if the level of support for the activity were reduced. (POA,
Security Management, 2012, ch5, p113).
17. What can lead to savings?
Ans: Periodic reassessment of security solutions. (POA, Security Management, 2012, ch5, p113).
18. The warranty for a new security system generally covers the first year of operation.
Ans: A maintenance contract for each subsequent year costs approximately what percent of the original
system cost? 13 percent of the original system cost. (POA, Security Management, 2012, ch5, p114).
17 ©All right reserved by IQC Security & Loss Prevention Consultancy
19. Collecting information is a paramount importance to security management. When the less staff will
resist reporting incidents?
Ans: The easier it is to create security reports. (POA, Security Management, 2012, ch5, p116).
20. The use of specially designed incident reporting forms also fosters easy data collection. What could
be the approach to using such form?
21. Report forms provide data necessary for asset protection operations; they should be analyzed
immediately by whom?
Ans: By a responsible supervisor. (POA, Security Management, 2012, ch5, p116).
22. What security managers do to validate information?
Ans: Conduct experiments. (POA, Security Management, 2012, ch5, p116).
23. What is the primary security task while dealing with the incident?
Ans: Reporting the incident and; must also be emphasized. (POA, Security Management, 2012, ch5,
p116).
24. In data collection process, when direct observation method can be used?
Ans: Direct observation can be used in some less serious, nuisance‐level situations to discover unknown
aspects of the problem. (POA, Security Management, 2012, ch5, p117).
25. How the real value of cost‐effectiveness data gathering comes?
Ans: By making periodic cumulative reports to senior management. (POA, Security Management, 2012,
ch5, p117).
26. What is the strength by using survey method while collecting data?
Ans: It makes possible the efficient collection data on large numbers of individuals; allows precise
comparisons to be made between the answers of respondents. (POA, Security Management, 2012, ch5,
p118).
27. What is the strength by using documentary method while collecting data?
18 ©All right reserved by IQC Security & Loss Prevention Consultancy
Ans: Can provide in‐depth materials and data on large numbers of subjects; is often essential when a
study is either wholly historical or has a historical dimension. (POA, Security Management, 2012, ch5,
p118).
28. What are the main methods used in social science research?
Ans: Main methods used in social science research are: 1‐ fieldwork, 2‐ survey, 3‐ documentary, 4‐
experiments. (POA, Security Management, 2012, ch5, p118)
29. Software aggregates the data for analysis. Analysis of aggregate data should lead the security
manager to discover what?
Ans: Trends, success, failures, costs, losses, savings, recoveries, what works, and what does not work,
along with a host of other information. (POA, Security Management, 2012, ch5, p119)
30. Display of the aggregate data is just as important as the data itself. While presenting information to
decision makers with limited time, what approach a security manager should undertake to convey
key points quickly?
Ans: Graphical display of data. (POA, Security Management, 2012, ch5, p119)
19 ©All right reserved by IQC Security & Loss Prevention Consultancy