Professional Documents
Culture Documents
CPP Exam Flash Cards
CPP Exam Flash Cards
CPP Exam Flash Cards
a. Environment
b. Indigenous
c. Economic
The one thing that distinguishes
disasters or major emergencies from
the emergencies plant personnel deal
with each day is the need for
coordinated emergency operations
The basic emergency plan should be
made up of three elements:
1. Authority
2. Types of emergencies
3. Plan execution
A community based emergency
control center must be established
to coordinate all efforts in a major
emergency
The value of an emergency plan is that it:
a. Provides a written record and means of
communicating information throughout the
organization
b. Assures that all procedures fit into an integrated
plan
c. Promotes uniformity
d. Assures a permanent record of decisions and
acquired knowledge
e. Provides a means of orientation of new
employees into emergency responsibilities
f. Permits management to delegate specific
authorities
g. Presents a public relations medium for communicate
to employees, customers and stockholders
“Emergency readiness” means
preparation has reached the point
where you are prepared to react
promptly to save life and protect
property if the plant is threatened or
hit by a major emergency
Every industrial firm, regardless of
size, should establish an internal
organization that will be able to
protect life and property in time of any
emergency
The Vital Records Protection Plan
should be tested at least once a year.
The tests of Vital Records Program
should verify that vital records
needed after a disaster are:
a. Current
b. Protected sufficiently against natural
disasters, nuclear detonation and other
perils
c. Retrievable as needed in usable form
The decision to evacuate a building
upon the receipt of a bomb threat
should be made by a senior member
of management
Bomb Threat - a search is made
after every bomb threat call.
a. Heat
b. Fuel
c. Oxygen, and a
d. Chemical reaction
Several by products
accompany every fire:
a. Smoke
b. Gas
c. Heat
d. Expanded air
Fire Classifications:
Class “A” - Ordinary combustibles (waste
paper, rags, and furniture)
Extinguish with Water or water fog
(Green triangle) Soda and Acid
Class “B” - Gas, grease oil, volatile fluids
Extinguish with CO2 or water fog
(Red Square) dry chemical
Class “C” - Electrical fires
Extinguish with non-conductive agent
(Blue circle) CO2
Class “D” - combustible metals
Extinguish with Dry powder
(Yellow star) Dry powder
Water fog is very effective for
Class “A” and “B” fires
A normal fire proceeds through
4 basic stages:
Carelessness
Ignorance
Most fires
are electrical in origin
More fire fatalities are caused by
toxic gases than by the flames
The major causes of death in a
building fire are:
a. Toxic gases
b. Smoke
c. High temperatures
d. CO2
e. Fear and resultant actions
f. The fire itself
Most sprinklers will operate at
temperatures between 130 and 165
F.
Halogenated agents
(1211, 1302)
are non-corrosive chemical agents
used for extinguishing fires in areas
containing computers and electrical
equipment
A fire door is for the purpose of
impeding the spread of fire
Automatic fire doors are held open
until there is sufficient combustion
to trigger the door closing devices
The focus of disaster control planning
is on solutions to major problems and
to prevent a disaster from becoming a
tragedy
The three principles of disaster
control planning are:
a. Coordinated planning;
b. Mutual assistance; and
c. Community resources
1. Searches made during work hours as a
result of a bomb threat call should be made
by:
a. Local Police Department
b. Military Police
c. Federal investigative personnel
d. Employees familiar with work area where
bomb is reportedly located
2. A cooperative organization of industrial
firms, business firms, and similar organizations
within an industrial community that are united
by a voluntary agreement to assist each other by
providing materials, equipment and personnel
needed to ensure effective industrial disaster
control during emergencies is called:
b. Sabotage
c. Fire
d. Earthquakes
5. Responsibility for shutdown of
machines in the plant as a result of disaster
should be assigned to:
a. The security officers on duty
b. The maintenance persons on duty
c. The persons familiar with the shutdown
process
d. The plant manager
6. In the event the media makes contact
as a result of a crisis situation, they should:
c. At home
b. Shutout
c. Lock in
b. 7-10%
c. 15%
Not 3
“Chain of command” is a
management term which refers to
the path along which authority
flows
Well-trained, well-supervised
security personnel may be the best
possible protection available to a
company
The accounting department of a
company is the most vulnerable to
major loss due to crime
“Unity of command” is a
management concept which means
that an employee should have only
one immediate superior to whom
the employee should report
The security manager should have the
necessary authority to carry out
responsibilities. To accomplish this, the
security manager should occupy a
position where the manager reports
directly to a vice-president or higher
The “Theory X” management
theory holds that the average
employee has little ambition,
dislikes work and must be coerced,
controlled and directed to achieve
organizational objectives - Douglas
McGregor
The “Theory Y” management
theory holds that the average
employee does not dislike work, is
self-directed, is creative and
imaginative, accepts responsibility
and is committed to achieving
organizational needs and
objectives -
Douglas McGregor
Theory X and Theory Y
were
developed by
Douglas McGregor
Those in management who believe the
behavioral assumption of “Theory X”
take an autocratic approach to get
work done.
Whereas “Theory Y” encourages
managers to support and encourage
employees in efforts to higher
achievement
The three main theories of
organizational behavior are:
a. Autocratic theory
b. Custodial theory
c. Supportive theory
The “autocratic theory” holds that
management is all-powerful and
employees are obligated to follow
orders without question
The “custodial theory” holds that
the aim of the company is to make
the employee happy and contented
through economic benefits and thus
they will be positively adjusted to
their work. This theory does not
motivate employees to produce to
their full capacity
The “supportive theory” holds that
through good leadership,
management will provide a climate
where employees will take on added
responsibilities and thus make
greater contributions to the growth
of the company.
Leadership: “We rather than they”
“Herzberg’s theory” is a
management theory which holds that
motivation comes from work
achievement satisfaction and not
from such things as salary and job
security
“Theory Z” is a recent
management style used effectively
by the Japanese. This theory
emphasizes humanized working
conditions along with attention by
management to enhance trust and
close personal relationships
“Management by objectives” also
known as “MBO” was introduced by
Peter Drucker. In this approach,
both subordinate and superior
agree on measurable goals to be
achieved primarily by the
subordinate over a stated period of
time
A “budget” is a plan stated in
financial terms. It sets forth in
dollars the necessary allocation of
funds to achieve the plan
“Risk analysis” is a management
method used to minimize risks
through application of security
measures commensurate with the
threat
The major resource required for a
risk analysis is
manpower
The most important management
skill
is the ability to
communicate effectively
Written communication
is the
best
means to communicate
The primary objective in
implementing a protection
program within an organization
should be to motivate every
employee to become part of the
protection team
Both private security and public
law have, as their primary mission,
the prevention of crime and
protection of persons and property
“Economic crime” is defined as the
illicit behavior having as its object the
unjust enrichment of the perpetrator
at the expense of the economic system
as a whole
Private security relies upon both
commercial security services and
government agencies for intelligence
gathering and crisis management
planning
Private security frequently avoids or
bypasses police with regard to white
collar or economic crime
Business crime is most effectively
attacked through sound management
controls. The emphasis on loss
prevention
rather than the “offender” involved
in the incident is a distinguishing
characteristic of private security.
About 95% to 99%
of activated alarms
are “false”
The main deterrent value of a
burglar alarm system is that the
alarm signal enunciated locally or
transmitted to a central station brings
a police response
Employee theft
was the
most frequently
investigated crime
by
private security
As a general rule, local law
enforcement has very little effect on
many crimes against business.
Exceptions are burglaries,
robberies and arson
Frequently cited measures for
improving private security are:
a. More or better training
b. Mandated training
c. Improved selection process
d. Higher wages
e. Establishment or improvement
of licensing and regulation
Two problems in police and security
relationships which seem to have the
greatest intensity of feelings are:
a. Secondary employment or
moonlighting by police officers
in private security
b. Police response to activated
alarms which are largely false
The two major components of
economic crime are white collar
and ordinary crime
80% of computer security
incidents result from insider attacks
by dishonest and disgruntled
employees
Only 1% of computer security
incidents annually are attributed to
“hackers”
The practice of preventing
unauthorized persons from gaining
intelligence information by
analyzing electromagnetic
emanations from electronic
equipment such as computers, is
often termed “tempest”
In the year 2000, expenditures for
private security industry will be
$104 billion while public law
enforcement expenditures will be
only $44 billion by 2000
Employment in private security is
projected to grow at 2.3% per annum
to 2000 while law enforcement
growth will be one percent annually
The term “narcotic” in its medical
meaning refers to opium and opium
derivatives or synthetic substitutes
“Drug dependence” is a condition
resulting from repeated use whereby
the user must administer
progressively larger doses to attain
the desired effect, thereby reinforcing
compulsive behavior
“Physical dependence” refers to an
alteration of the normal functions of
the body that necessitates the
continued presence of a drug in order
to prevent the withdrawal or
abstinence syndrome
The poppy
(papaver somnifferum)
is the main source of the
non-synthetic narcotics
Examples of synthetic narcotics,
which are produced entirely within
the laboratory, are meperidine and
methadone
Depressants have a potential for both
physical and psychological
dependence. Some examples :
a. Chloral Hydrate
b. Barbiturates
c. Benzodiazepines
When “depressant” drugs are used to
obtain a “high” they are usually
taken in conjunction with another
drug, such as alcohol
“Stimulants” are drugs which may
produce a temporary sense of
exhilaration, superabundant
energy and hyperactivity including
extended wakefulness.
Examples are cocaine and
amphetamines
The two most prevalent stimulants
are nicotine and caffeine, both
accepted in our culture
The most potent stimulant of natural
origin is cocaine which is extracted
from the leaves of the coca plant
Excessive doses of cocaine may
cause seizures and death. There is
no “safe” dose of cocaine
“Marijuana” refers to cannabis plant
parts and extracts that produce
somatic or psychic changes in
humans
The hemp plant grows wild
throughout most of the tropic and
temperate regions of the world
“Hallucinogenic” drugs distort the
perception of objective reality.
Examples are:
a. LSD
b. Mescaline and peyote
c. Phencyclidine (PCP)
d. Amphetamine Variants
(such as DOM and DOB)
Long after hallucinogens are
eliminated from the body, users may
experience “flashbacks”
DOM, DOB, JDA, MDMA, DET
and MDA are hallucinogens which are
synthesized in the laboratory
Another source of hallucinogens
(psilocybin and psilocyn) is
psilocybe mushrooms
“Designer” drugs are analogues of
controlled substances with slight
variations in their chemical structure
so as not to be specifically listed as a
controlled substance
A “drug” is a substance which,
because of its chemical make-up,
alters the mood, perception or
consciousness of the user. All drugs
are not illegal.
The most abused “drug” is alcohol and
the most used “drug”
also alcohol
“Tolerance” is a body condition
wherein ever-increasing amounts of
a drug are needed to gain the desired
effect
The street name for
PCP
is
“angel dust”
The person most likely to become an
alcoholic is a white male over 40
who is living alone
The following behavioral characteristics are
associated with substance abuse:
a. Abrupt changes in attendance, quality of work grades
and work output
b. Attitude changes
c. Withdrawal from responsibility
d. Breakdown in personal appearance
e. Wearing sunglasses at inappropriate times
f. Wears long-sleeved garments to hide needle marks
g. Association with known substance abusers
h. Excessive borrowing of money
I. Stealing small items from home, work or school
j. Secretive habits
Internal Accounting - Audit
To insure correctness and
accuracy of accounting records
Not to detect theft and fraud
More losses due to accounting
errors than by theft
External Audit
Valuable because the persons
conducting the audit do not know
your business / company
Financial Aspects
“CL” - Current Liability
“L/T” - Long term Liability
Payroll
Biggest problem is “Ghosting”
Ghosting
Paying people that don’t exist
Morphine
One of the most effective drugs
known for the relief of pain.
Codeine
It is by far the most widely used
“natural occurring narcotic”.
Substance Abuse
Thebaine
the principal alkaloid in a species
of poppy which has been grown
experimentally in the U.S.
converted into a variety of
medical compounds including
codeine.
Substance Abuse
Etorphine and Diprenorphine
made from Thebaine
Etorphine is more than a
thousand times as potent as
morphine in it’s analgesic,
sedative and respiratory
depressant effect
Substance Abuse
Hydromorphone
Highly marketable with a
potency two to eight times as
great as morphine.
Substance Abuse
Meperidine (Pethidine)
Probably the most widely used
drug for the relief of moderate
to severe pain
Substance Abuse
Narcotic Antagonists
A class of compounds developed
to block and reverse the effects of
narcotics
Substance Abuse
Chloral Hydrate
The oldest of sleep inducing drugs
liquid with a slightly acrid odor
and a bitter, caustic taste
Substance Abuse
Benzodiazepines
Depressants which relieve
anxiety, tension and muscle spasms
as well as producing sedation and
preventing convulsions.
Substance Abuse
Stimulants
Of all abused drugs,
stimulants are the most
powerfully reinforcing.
Substance Abuse
Stimulants
The two most prevalent
stimulants are nicotine in tobacco
and caffeine.
Substance Abuse
Cocaine
The most potent stimulant of
natural origin.
Designated as a narcotic in the
US CSA
Substance Abuse
Khat
Compulsive use may result in
manic behavior with grandiose
delusions or in a paranoid type of
illness, sometimes accompanied
by hallucinations.
Substance Abuse
Alcohol
The most used and abused
recreational drug. Physical
dependence can occur if alcohol is
taken regularly in large quantities.
Drug Screening
Enzyme Multiplied Immunoassay Technique (EMIT)
screens
easy to administer and relatively inexpensive
Gas Chromatography/Mass Spectrometry
used for confirming tests
Initial positives are confirmed before any personnel
action is taken.
Confirming tests should be done on the same
specimen.
Drug Screening
To avoid liability in the screening process:
Notify all to be tested of the screening process.
Get consent from persons tested.
Provide prior notice to incumbents that testing is a
condition of continued employment.
Define the circumstances under which testing is done.
Drug Screening
To avoid liability in the screening process:
Insure a positive identification and chain of custody for
specimen collection, identification and handling.
Limit dissemination of test results.
Maintain an Employee Assistance Program.
Regularly verify results from test facilities.
1. One supervisor can effectively control
only a limited number of people and that
limit should not be exceeded. This principle
is called:
a. Turnover
b. Cost
c. Manpower resource
d. Skills
19. Ideally, the person who should
conduct the inspection of a security
department is:
a. An outside consultant
b. The second ranking person
c. The security director or security manager
d. The ranking sergeant
20. The process of determining the
probability and cost of potential loss is
known as:
a. Shoplifting
b. Shrinkage
c. Internal Theft
d. Pilferage
45. Pilferage is defined as stealing in
small quantities over a long period of time.
The taking of property entrusted to
someone’s care is called:
a. Mistake of fact
b. Misprison of a felony
c. Uttering
d. Embezzlement
46. The theft triangle consists of the
following components:
a. Tempest
b. Veiling
c. Bugging
d. Hardening
59. Which of the following is not a correct
statement with regard to narcotics?
a. Cocaine
b. Amphetamines
c. Phenmetrazine
d. Mescaline
66. All of the following are factual statements
descriptive of illicit cocaine except one, which is:
b. Bacarate
c. Piegine
d. Snow
68. Which of the following statements does not
pertain to cocaine ?
a. It has a medical use as a sedative
b. Hallucinogen
c. Stimulants
d. Depressants
70. All of the following are hallucinogens
except:
a. LSD
c. Mescaline
d. Phencyclidine
71. The source of marihuana is the:
a. Peyote cactus
b. Mushrooms
b. Injection
c. Smoking
a. Tolerance
b. Physical dependence
c. Addiction
d. Psychological Dependence
74. The state of periodic or chronic intoxication
produced by the repeated consumption of a
substance is known as:
a. Tolerance
b. Addiction
c. Habituation
Whereas
a. Circle search
b. Strip search
c. Grid search
d. Zone or sector search
The most important rule in crime
scene photography is to
photograph all evidence or
possible evidence before anything is
moved or touched
With regard to the collection of
evidence, “Chain of custody” is a
chronological written record of
those individuals who have had
custody of the evidence from its
initial acquisition until its final
disposition
A “Questioned Document” is a
document whose genuineness is
questioned, normally because of
origin, authenticity, age or
circumstances under which the
document was written
An “exemplar” is a document
requested by the investigator which
duplicates the text of a questioned
document and is known to be the
product of a particular person or
machine
There is no specific format for the
taking of notes required during an
investigation
Written statements used in
recording investigative facts are
primarily of the following types:
a. Affidavit
b. Question/answer statement
c. Unsworn statements
d. Memorandum of interview
There are many qualifications to be a
good undercover investigator such as:
a. Willingness to do the job
b. Self-confidence
c. Resourcefulness and adaptability
d. Initiative and judgment
e. Patience
Probably the most important aspect of
an undercover operation is a credible
cover or background story used by the
undercover agent
Knowing when and how to close an
undercover operation is as important
as knowing how to start and proceed
The three most frequently used
investigative techniques are:
a. Informants
b. Surveillance
c. Undercover
There are two major types of
surveillance:
a. Physical
b. Technical
Surveillance is defined generally as
the secretive and continuos
observation of persons, places and
things to obtain information
concerning the activities and
identities of individuals
One of the most important
qualifications of the person selected
to conduct a physical surveillance
is to be able to blend into the
environment with “normal”
appearance
One of the most important rules of
physical surveillance is:
“need-to-know” basis
The primary type of evidence to be
collected at a crime scene is that
which is relevant
A knowledge of basic accounting
terms is necessary in white-collar
investigations. Two important terms
are:
a. “Accounts payable”
money owed to suppliers
b. “Accounts receivable”
money owed by customers
One of the most common errors made
in the interrogation of a subject in a
larceny case is failure to ask if he/she
stole the object
An “open-ended” question affords the
interviewee opportunity to reply in a
narrative fashion
Indirect approach
exploratory in nature
Direct approach
suspect’s guilt is reasonably certain
Devices to detect deception
Polygraph
records changes in respiration, blood pressure, pulse and
skin’s sensitivity to electricity
Psychological stress evaluation
does not require body attachment
It records and analyzes stress-related components of the
human voice
with or without knowledge of individual being tested
Devices to detect deception
Voice analyzer
does not require body attachment
Records sub-audible tremors in speech on a digital tape
Processes speech electronically and provides immediate
results for single or multiple-word questions
Surveillance
A surveillance can be either covert or overt
Two basic forms of surveillance
Physical - done by humans
Technical - done by technical and electronic equipment
The most difficult type of surveillance is the “moving
surveillance.” This entails following the subject
wherever he goes
Claims Investigations
Interviews in claims investigations should result in
obtaining statements
A claims report serves several purposes:
Provides a permanent record
Provides a summary of all claims
Brings together the various parts of the file
Embezzlement
One of the most effective counter-measures against
embezzlement is a disciplined environment with
appropriate audits and other appropriate safeguards
Fraud
b. Dynamite
c. Nitroglycerin
b. Dynamite
c. Nitroglycerin
b. Nitroglycerin
c. Dynamite
b. Nitroglycerin
c. Dynamite
b. Malicious
c. Burning
d. Willful
10. One of the following is not considered
an element of the common law crime or
arson:
b. Malicious
c. Burning
d. Willful
11. Which of the following is not a
requirement for a successful undercover
investigation:
a. A qualified investigator
b. Equipment
c. Maintenance
b. Equipment
c. Maintenance
b. 5 years
c. 3 years
d. 2 years
16. Any investigation containing
unfavorable information should be
retained in file for a period of not less than:
a. 1 year
b. 5 years
c. 3 years
d. 2 years
17. The rule which states that
approximately one in ten applications will
have major omissions which will require
going back to the applicant is called:
d. In an automobile
19. If interviewee during investigations is
hostile, it is preferable to conduct the
interview at:
a. The security office
d. In an automobile
20. Which of the following characterization
regarding investigative surveillance is not
true?
a. They are expensive
Proprietary Information
Information over which the possessor
asserts ownership and which is related
to the activities or status of the
possessor in some special way
Definitions
Patent
A government grant conveying and
securing the exclusive right to make,
use, and sell an invention for a term
of years (seventeen)
Trade Secret
A trade Secret is a process or device for
continuous use in the operation of the
business
Eavesdropping is a psychological
traumatic experience for the
victim.
It is the most devastating of
espionage techniques.
Wired microphones
Carbon microphone
commonly used in a standard telephone handset
Crystal microphone
generates a small electrical current when the crystal is
vibrated by sound waves
Contact microphone
installed on a common wall with the target area
Wired microphones
Spike microphone
installed in a hole in the common wall (not
fully through)
Dynamic microphone
movement of a small wire near a permanent magnet
converts sound into electrical energy. Good eavesdropping
device which operates as a loudspeaker in reverse
Wired microphones
A microphone
A transmitter
A power supply
An antenna; and,
A receiver
Light transformation
1. Infrared light wave transmissions use light
waves invisible to the human eye. Sound waves are
converted to electronic impulses and the pulses are
used to modulate infrared light waves. Similar to a TV
remote
Light transformation
Audio masking
generation of noise at the perimeter of
the secure area to cover or mask
conversation. Music is not used;
“white” or “pink” noise is not as easily
filtered from the tape
1. Any formula, pattern, device or
compilation of information which is used in
one’s business and which gives him an
opportunity to gain an advantage over
competitors who do not know or use it is:
a. A monopoly
b. An unfair trade practice
c. A trade secret
d. A patent
1. Any formula, pattern, device or
compilation of information which is used in
one’s business and which gives him an
opportunity to gain an advantage over
competitors who do not know or use it is:
a. A monopoly
b. An unfair trade practice
c. A trade secret
d. A patent
2. Probably the main reason for loss of
sensitive information is:
a. Inadvertent disclosure
b. Deliberately stolen by outsider
c. Industrial espionage
d. Deliberately stolen by insider
2. Probably the main reason for loss of
sensitive information is:
a. Inadvertent disclosure
b. Deliberately stolen by outsider
c. Industrial espionage
d. Deliberately stolen by insider
3. The primary tool of pre-employment
screening is the:
a. Interview
b. Application form
c. The investigation
d. The investigator
3. The primary tool of pre-employment
screening is the:
a. Interview
b. Application form
c. The investigation
d. The investigator
4. Competitive intelligence gathering is a
legitimate activity which is engaged in by many
firms throughout the world. The most important
function of competitive intelligence is to:
a. Alert senior management to marketplace
changes in order to prevent surprise
b. Alert senior management as to the personal
habits of competitive senior management
c. Alert government intelligence agencies to
marketplace changes
d. Alert senior management to changes in
protocol in foreign countries
4. Competitive intelligence gathering is a
legitimate activity which is engaged in by many
firms throughout the world. The most important
function of competitive intelligence is to:
a. Alert senior management to marketplace
changes in order to prevent surprise
b. Alert senior management as to the personal
habits of competitive senior management
c. Alert government intelligence agencies to
marketplace changes
d. Alert senior management to changes in
protocol in foreign countries
5. The instrument used to monitor
telephone call by providing a record of all
numbers dialed from a particular phone is
called:
a. A wiretap
b. A bug
c. An electronic surveillance
d. A pen register
5. The instrument used to monitor
telephone call by providing a record of all
numbers dialed from a particular phone is
called:
a. A wiretap
b. A bug
c. An electronic surveillance
d. A pen register
6. A clandestine listening device,
generally a small hidden microphone and
radio transmitter is known as :
a. A bug
b. A wiretap
c. A tempest
d. A beeper
6. A clandestine listening device,
generally a small hidden microphone and
radio transmitter is known as :
a. A bug
b. A wiretap
c. A tempest
d. A beeper
7. A microphone with a large disk-like
attachment used for listening to audio from
great distances is known as:
a. 2%
b. 5%
c. 10%
d. 15%
26. Vital records normally constitute the
following percentage of the company’s total
records:
a. 2%
b. 5%
c. 10%
d. 15%
27. A specially constructed microphone
attached directly to an object or surface to
be protected and which responds only
when the protected object or surface is
disturbed is known as:
a. Parabolic microphone
b. Special audio microphone
c. Contact microphone
d. Surreptitious microphone
27. A specially constructed microphone
attached directly to an object or surface to
be protected and which responds only
when the protected object or surface is
disturbed is known as:
a. Parabolic microphone
b. Special audio microphone
c. Contact microphone
d. Surreptitious microphone
28. “Social engineering” is:
a. The conversation involved in the beginning of a
romantic relationship
b. A function of the personnel department in which
like persons are teamed together in
workshops or seminars for maximum
productivity
c. The subtle elicitation of information without
revealing the true purpose of the call
d. The specific design of a business structure to
facilitate the interaction of the inhabitants
28. “Social engineering” is:
a. The conversation involved in the beginning of a
romantic relationship
b. A function of the personnel department in which
like persons are teamed together in
workshops or seminars for maximum
productivity
c. The subtle elicitation of information without
revealing the true purpose of the call
d. The specific design of a business structure to
facilitate the interaction of the inhabitants
29. A former employee, who had access to your trade
secret information, is now employed by a competitor and is
apparently using the trade secret information to gain market
share. There are several serious factors you should consider
before you institute litigation in the matter. Which of the
following is not a serious factor to be considered?
a. You may have to expose the very secrets you are
attempting to protect
b. The cost of the litigation may exceed the value of
the secret information
c. You may lose your case
d. Other employees may leave the company and
attempt to use trade secret information in the
business of a new employer
29. A former employee, who had access to your trade
secret information, is now employed by a competitor and is
apparently using the trade secret information to gain market
share. There are several serious factors you should consider
before you institute litigation in the matter. Which of the
following is not a serious factor to be considered?
a. You may have to expose the very secrets you are
attempting to protect
b. The cost of the litigation may exceed the value of
the secret information
c. You may lose your case
d. Other employees may leave the company and
attempt to use trade secret information in the
business of a new employer
30. Electromagnetic radiation is
detectable electromagnetic energy is
generated by electronic information
processing devices. Which of the following
is used to protect very sensitive equipment?
a. A current carrier device
b. Pneumatic cavity shielding
c. Tempest shielding
d. Pen register shielding
30. Electromagnetic radiation is
detectable electromagnetic energy is
generated by electronic information
processing devices. Which of the following
is used to protect very sensitive equipment?
a. A current carrier device
b. Pneumatic cavity shielding
c. Tempest shielding
d. Pen register shielding
In implementing an asset protection
program, one primary objective should
be to motivate all employees to become
part of the protection program
All asset protection programs should
provide for adequate feedback on the
part of participants
Although the chief executive in charge
of asset protection should have
knowledge of security procedures and
techniques, it is more important that
such executives be able to manage and
implement the required systems
approach
The three basic security processes
are:
a. Information
b. Physical
c. Personnel
Of the three basic security processes,
personnel security is considered to
be the most critical
The basic elements of the personnel security
process are:
a. Protects the organization against undesirable
persons through appropriate recruitment and
hiring safeguards
a. The application
b. The interview
A background investigation is expensive but
necessary in the personnel security process.
The major purposes of this type of
investigation are:
a. Motive
b. Desire
c. Opportunity
As a general rule, the questions relating to the
following should not be asked of applicants
during the screening process in order to
conform to equal employment opportunity rules
and regulations:
“Rule of Ten”
The most important information
gathering tool in a background
investigation is the completed
application form
As a general rule, no application more
than 90 days old should be considered
without a re-interview of the applicant
The principal behind integrity tests
is that an individual who has
developed strong attitudes towards
honesty is less likely to engage in
dishonesty than an individual who
possesses weaker attitudes towards
dishonesty.
Employment gaps of more than one
month must be explained
The job description for a position
must include accurate specifications
and genuine skill requirements
which are described concisely and
without prejudice.
Purpose and Function
Personnel Security’s primary purpose is to insure that
a firm hires employees best suited to assist the firm in
achieving its goals, and after hired, assist in providing
the necessary security to the employees while they are
carrying out their functions
Purpose and Function
Vulnerability to losses caused by employees is
measured in part by the character of the employees,
their awareness of assets protection requirements, and
their motivation to cooperate
Personnel Security is the most critical because theft
is committed by people
The Job Description
Accurate job specifications increase objectivity in
making selection decisions and reduce the likelihood
that irrelevant criteria and personal bias will influence
the decision
The Application
There are virtually no restrictions on what can be
asked of an individual once an offer of employment
has been made.
Education
Approximately 5 % of all professional applicants
falsify some aspect of their educational background.
Interview
A personal interview of each applicant should be
conducted by an trained interviewer
Background Investigation
Should be completed prior to allowing the applicant to
commence employment
b. Personnel
c. Physical
d. Perimeter
1. Of all security processes, the most
critical is:
a. Information
b. Personnel
c. Physical
d. Perimeter
2. The concept that an individual should be
aware of the security program and persuaded
that the program is relevant to his or her own
behavior is known as:
a. Security consciousness
b. Security awareness
c. Security motivation
d. Motivation analysis
2. The concept that an individual should be
aware of the security program and persuaded
that the program is relevant to his or her own
behavior is known as:
a. Security consciousness
b. Security awareness
c. Security motivation
d. Motivation analysis
3. The theory that the human organism is
motivated by an ascending series of needs and that
once the lower needs have been satisfied, they will
be supplanted by the higher needs as motives for
behavior is known as:
b. Honest
c. Indifferent
b. Honest
c. Indifferent
a. Never
b. Every 6 months
c. Every year
d. Every 18 months
15. The frequency of reinvestigation of the
“financial life style” inquiry should
generally be:
a. Never
b. Every 6 months
c. Every year
d. Every 18 months
16. Any investigation which includes
unfavorable information, or which results in
an adverse employment decision, should be:
An effective
compliance program has
seven mandatory
components:
Federal Sentencing Guidelines
1. Establishment of compliance
standards which are reasonably
capable of preventing criminal
conduct.
2. Specific responsibility for high
level management to oversee the
standards.
Federal Sentencing Guidelines
3. Communication of standards and
offering training in compliance issues
to employees.
4. Tests of the compliance system
with auditing, monitoring, and other
tests designed to detect criminal
conduct.
Federal Sentencing Guidelines
5. Due care to insure that discretionary
authority is not delegated to individuals
with a propensity to engage in illegal
conduct.
6. Enforcement using disciplinary
procedures which include provisions for
discipline of individuals who fail to
detect or report an offense.
Federal Sentencing Guidelines
a. Probation
b. Parole
c. Corpus Juris
d. Detainer
7. The release of a convicted person
under certain conditions without having to
be imprisoned is known as:
a. Probation
b. Parole
c. Corpus Juris
d. Detainer
8. The release from confinement of a
person who has served part of a sentence is
called:
a. Probation
b. Parole
c. Reprieve
d. Commutation
8. The release from confinement of a
person who has served part of a sentence is
called:
a. Probation
b. Parole
c. Reprieve
d. Commutation
9. The process in which a court abides
by a previous court decision is known as:
a. Corpus Delicti
b. Habeas corpus
c. Ex-post facto
d. Stare decisis
9. The process in which a court abides
by a previous court decision is known as:
a. Corpus Delicti
b. Habeas corpus
c. Ex-post facto
d. Stare decisis
10. The crime of unlawful entry into or
remaining within a building, with intent to
commit some crime therein is:
a. Robbery
b. Trespass
c. Burglary
d. Embezzlement
10. The crime of unlawful entry into or
remaining within a building, with intent to
commit some crime therein is:
a. Robbery
b. Trespass
c. Burglary
d. Embezzlement
11. To make proof of intent easier in
proving shoplifting, many stores have a
policy which requires apprehension of a
suspect to be made:
a. Hearsay
b. Illegally induce crime
c. Ex-post facto
d. Entrapment
16. When a law enforcement agent
induces the commission of a offense not
otherwise contemplated, the accused may
use an affirmative defense known as:
a. Hearsay
b. Illegally induce crime
c. Ex-post facto
d. Entrapment
17. The imputation of another’s negligence
to the employer is described as:
a. Gross liability
b. Vicarious liability
c. Agency liability
d. Net liability
17. The imputation of another’s negligence
to the employer is described as:
a. Gross liability
b. Vicarious liability
c. Agency liability
d. Net liability
18. A willful or negligent wrong done by
one person to another is a :
a. Crime
b. Misdemeanor
c. Felony
d. Tort
18. A willful or negligent wrong done by
one person to another is a :
a. Crime
b. Misdemeanor
c. Felony
d. Tort
19. The unlawful taking of property by
force or threat of force constitutes the
crime of:
a. Burglary
b. Robbery
c. Assault and battery
d. Larceny
19. The unlawful taking of property by
force or threat of force constitutes the
crime of:
a. Burglary
b. Robbery
c. Assault and battery
d. Larceny
20. The act of inducing a person to
commit a crime for the purpose of having
him arrested is known as:
a. Solicitation
b. Entrapment
c. Nolo contendre
d. Misprison
20. The act of inducing a person to
commit a crime for the purpose of having
him arrested is known as:
a. Solicitation
b. Entrapment
c. Nolo contendre
d. Misprison
21. Deadly force may be used to defend
yourself if you:
a. Reasonably believe deadly force is
necessary to protect yourself or another from
unlawful use of deadly force of a third party
b. Your home is broken into
c. You are protecting your property
d. You are attacked by a drug dealer
21. Deadly force may be used to defend
yourself if you:
a. Reasonably believe deadly force is
necessary to protect yourself or another
from unlawful use of deadly force of a
third party
b. Your home is broken into
c. You are protecting your property
d. You are attacked by a drug dealer
22. The prohibition against being tried
twice for the same crime is found in the:
a. Conversion
b. Larceny
c. Trespass
d. Embezzlement
36. Wrongful appropriation of the
personal property of another to the use of
the taker is a tort called:
a. Conversion
b. Larceny
c. Trespass
d. Embezzlement
37. A writ issued by a court directing the
recipient to appear and testify is a:
a. Warrant
b. Subpoena
c. Writ of Mandamus
d. Writ of prohibition
37. A writ issued by a court directing the
recipient to appear and testify is a:
a. Warrant
b. Subpoena
c. Writ of Mandamus
d. Writ of prohibition
38. The general rule as to the amount of
force a security officer is permitted to use
in order to accomplish a lawful arrest is:
Laminated Glass:
a. used in Detention Facilities
b. Highly shatter resistant
Bullet resisting glass:
a. Laminated glass
b. “spalding” will not occur
1. Incipient stage
2. Smoldering stage
3. Flame stage
4. Heat stage
Color Rendition
The ability of a lamp to
faithfully reproduce the
colors seen in an object
Quartz Lamps
Emit a very bright white light and snap in rapidly
Excellent for use along perimeters and in critical areas
Frequently used at very high wattage
Protective Lighting
Floodlights
Directional, with some diffusion to light specific areas
Searchlights
concentrated beam, used for illumination of boundaries
Protective Lighting
Fresnels
Wide beam units for long horizontal strips. They project a
narrow beam approximately 180 degrees in the horizontal
and from 15 -30 degrees in the vertical plane. An
appropriate application is to light parameters since little
light is lost vertically
Street Lights
Diffused light widely used in parking areas
Safes and Vaults
Burglary-resistive safe
As a general rule, require the door be made of steel at least
1-1/2 inches thick
Vaults are described as enlarged safes
Alarms for vaults:
Capacitance
Vibration
Locks and Key Systems
Cypher locks - digital combination door
locking device
b. Warded
c. Combination
d. Wafer
18. The type of lock generally used on
automobiles, desks and cabinets is:
a. Pin tumbler
b. Warded
c. Combination
d. Wafer
19. Which of the following is not true
with regard to door latches:
a. A deadbolt latch may be used on almost any
door
b. A deadbolt latch is easy to install
c. A deadbolt latch is inexpensive
d. Chain latches are highly recommended as
effective security measures
19. Which of the following is not true
with regard to door latches:
b. 20 feet
c. 22 feet
d. 30 feet
22. Non-insulated security containers
must satisfactorily pass a drop test of:
a. 15 feet
b. 20 feet
c. 22 feet
d. 30 feet
23. Which of the following is not an
approved UL record safe classification:
a. 350-4
b. 350-3
c. 350-2
d. 350-1
23. Which of the following is not an
approved UL record safe classification:
a. 350-4
b. 350-3
c. 350-2
d. 350-1
24. The acceptable vault construction of
insulated doors is a minimum reinforced
thickness of:
a. 12”
b. 10”
c. 8”
d. 6”
24. The acceptable vault construction of
insulated doors is a minimum reinforced
thickness of:
a. 12”
b. 10”
c. 8”
d. 6”
25. Which of the following would be an
acceptable computer media storage
classification:
a. 350-4
b. 450-4
c. 250-4
d. 150-4
25. Which of the following would be an
acceptable computer media storage
classification:
a. 350-4
b. 450-4
c. 250-4
d. 150-4
26. UL classified safes must be anchored
to the floor or weigh at least:
a. 750 lbs.
b. 1,000 lbs.
c. 1,250 lbs.
d. 1,500 lbs.
26. UL classified safes must be anchored
to the floor or weigh at least:
a. 750 lbs.
b. 1,000 lbs.
c. 1,250 lbs.
d. 1,500 lbs.
27. A “re-lock” on a vault automatically
stops the bolt mechanism from operating
when:
a. A switch is flipped
b. A timer is used
c. When there is an attack on the door or
combination lock
d. Locked by remote control
27. A “re-lock” on a vault automatically
stops the bolt mechanism from operating
when:
a. A switch is flipped
b. A timer is used
c. When there is an attack on the door or
combination lock
d. Locked by remote control
28. Security vaults differ from safes in
that:
a. They are tested by Underwriters
Laboratories for burglary resistance
b. They do not have both fire and burglary
resisting properties
c. Steel is used
d. They are permanently affixed to
building
28. Security vaults differ from safes in
that:
a. They are tested by Underwriters
Laboratories for burglary resistance
b. They do not have both fire and burglary
resisting properties
c. Steel is used
d. They are permanently affixed to
building
29. The weakness of the burning bar as a
burglar tool is:
a. It will not burn through concrete
b. Produces large volumes of smoke
c. Actual heat is not intense enough
d. It requires tanks of hydrogen
29. The weakness of the burning bar as a
burglar tool is:
a. It will not burn through concrete
b. Produces large volumes of smoke
c. Actual heat is not intense enough
d. It requires tanks of hydrogen
30. Which of the following is not correct
with regard to safes?
a. UL classification labels are removed
from all safes exposed to fires
b. Record safes are designed to resist fires only
c. Money safes have accredited fire
resistance
d. Quality equipment should be purchased only
from reputable dealers
30. Which of the following is not correct
with regard to safes?
a. UL classification labels are removed
from all safes exposed to fires
b. Record safes are designed to resist fires only
c. Money safes have accredited fire
resistance
d. Quality equipment should be purchased only
from reputable dealers
31. The symbol “TRTL” indicates:
a. 3 guards
b. 6 guards
c. 2 guards
b. 6 guards
c. 2 guards
a. An annunciator
b. Contact device
c. Break alarm
d. Cross alarm
59. A visual indicator that shows from
which of several zones or buildings an
alarm signal has originated is called:
a. An annunciator
b. Contact device
c. Break alarm
d. Cross alarm
60. A specially constructed microphone
attached directly to an object or surface to
be protected and which responds only
when the protected object or surface is
disturbed is known as:
a. Parabolic microphone
b. Special audio device
c. Contact microphone
d. Surreptitious microphone
60. A specially constructed microphone
attached directly to an object or surface to
be protected and which responds only
when the protected object or surface is
disturbed is known as:
a. Parabolic microphone
b. Special audio device
c. Contact microphone
d. Surreptitious microphone
61. Which of the following is not true with
regard to establishing an identification of
personnel system to control movement?
a. The ID card or badge should be designed in a
relatively complicated manner to avoid
duplication
b. The ID card should be designed as simple as
possible
c. Procedures should be designed to show
employees what to do when ID card is lost
d. Details should be prepared and disseminated as
to where, when, and how the badge should be worn
61. Which of the following is not true with
regard to establishing an identification of
personnel system to control movement?
a. The ID card or badge should be designed in a
relatively complicated manner to avoid
duplication
b. The ID card should be designed as simple as
possible
c. Procedures should be designed to show
employees what to do when ID card is lost
d. Details should be prepared and disseminated as
to where, when, and how the badge should be worn
62. The most vulnerable link in any
identification system is?
a. 10 feet
b. 15 feet
c. 30 feet
d. 20 feet
65. Between the perimeter barrier and
exterior structures should be a clear
zone of:
a. 10 feet
b. 15 feet
c. 30 feet
d. 20 feet
66. As a general rule, between the
perimeter barrier and structures within the
protected area, except when a building is a
part of the perimeter barrier, there should
be a clear zone of at least:
a. 50 feet
b. 40 feet
c. 30 feet
d. 20 feet
66. As a general rule, between the
perimeter barrier and structures within the
protected area, except when a building is a
part of the perimeter barrier, there should
be a clear zone of at least:
a. 50 feet
b. 40 feet
c. 30 feet
d. 20 feet
67. Measured horizontally 6 inches above
the ground and at least 30 feet outside the
exclusion area to barrier, the perimeter
band of lighting must provide a minimum
intensity of:
a. 0.5 foot candles
b. 0.3 foot candles
c. 0.4 foot candles
d. 0.2 foot candles
67. Measured horizontally 6 inches above
the ground and at least 30 feet outside the
exclusion area to barrier, the perimeter
band of lighting must provide a minimum
intensity of:
a. 0.5 foot candles
b. 0.3 foot candles
c. 0.4 foot candles
d. 0.2 foot candles
68. Which of the following principles of
protective lighting is not correct?
a. Lighting should not be used alone. It should
be used with other measures such as fixed
security posts, fences, etc.
b. Glaring lights should be in the eyes of the
intruder
c. A large amount of light should be focused on
security patrol routes
d. Adequate, even light should be upon
bordering areas
68. Which of the following principles of
protective lighting is not correct?
a. Lighting should not be used alone. It should
be used with other measures such as fixed
security posts, fences, etc.
b. Glaring lights should be in the eyes of the
intruder
c. A large amount of light should be focused
on security patrol routes
d. Adequate, even light should be upon
bordering areas
69a. Piers and docks located on an installation
should be safeguarded by illuminating both
water approaches and the pier area. Decks on
open piers should be illuminated to at least: