Está en la página 1de 26

The professional protection officer.

Practical security strategies and emerging trends.


International foundation for protection officers.

Antwoorden van de opdrachten uit het lesboek.


Chapter 1 a b a a d a b c d a Chapter 11 c d a b b a a b d d Chapter 21 b a a d a+c+d d b d? b a Chapter 2 b d a d c b d b a Chapter 3 b d c c c b? a d d d Chapter 13 b c a d b c b a c c Chapter 23 a d b b a c c a c c Chapter 4 a b a d c c b b d b Chapter 14 d a c a a b a c a b Chapter 24 a xx a b b c c d b a Chapter 5 d? d a a d b d? b d b? Chapter 15 a c b d c c a b a b Chapter 25 c b d b a a b d b d Chapter 6 a b d c d d a b d d Chapter 16 c b a b d c c a c b Chapter 26 c d a b a c c d a c Chapter 7 a a b b a a c c b a Chapter 17 d d b c d c d c d c? Chapter 27 a b a b+c+e a c b d a b Chapter 8 d a d b a b b d b b Chapter 18 a b b a d c d e d b Chapter 28 d d a c b c a c b d? Chapter 9 b a b b a+d b+c c b a b Chapter 19 b a a b? b a a b a d Chapter 29 a a b b d a b a a b Chapter 10 b b c a a d d a d c Chapter 20 b b a a a b a a d a Chapter 30 b b a c e a a a a d

1 2 3 4 5 6 7 8 9 10

1 2 3 4 5 6 7 8 9 10

Chapter 12 b c b a b a d e b a Chapter 22 c b b b c a b d b a

1 2 3 4 5 6 7 8 9 10

1 2 3 4 5 6 7 8 9 10

Chapter 31 c b b d a d b a b? a

Chapter 32 d b c a c a d a b a

Chapter 33 a a b b b a d a d d

Chapter 34 a b a b d d b d a a

Chapter 35 b b c a b a b a a b

Chapter 36 b b a b d a b b b c

Chapter 37 a b a c b d d a c b

Chapter 38 a b b a d d b? d a e

Chapter 39 b a a b a b a b b a

Chapter 40 a a b d b a b c b a

1 2 3 4 5 6 7 8 9 10

Chapter 41 b a b b b b b a d a

Chapter 42 d a a c b a d a d d

Chapter 43 c d b d d a d a a a

Chapter 44 c b b c d a d b a a

Chapter 45 c b c a b d a a c b

Langste antwoord is het juist antwoord 63 keer. Antwoorden met als antwoord all the above 53 keer. Uitzondering van antwoorden met all the above 5 keer. Antwoorden met als antwoord een cijfer 14 keer. Antwoorden met meerdere correcte antwoorden 4 keer.

Hoofdstuk 1

1. The ASIS international general security Risk assessment guideline defines an asset as any real or individual owns, that can be given or assigned a monetary value. True 2. CPTED stands for Crime Prevention through Environment Dedication. False 3. Physical security planning was originally based upon response to a military threat. True 4. Risk management is a term closely associated with the insurance industry. True 5. A vulnerability assessment will include a thorough examination of the following: All of the above 6. Deterrence is the practice of discouraging an individual or group from even attempting to attack the asset. True 7. All risks can be reduced completely. False 8. There is a theory of loss control developed by Bottom and Kostanoski in security and loss control. It is known as: WAECUP 9. The most intangible valuation of an asset would be in what is referred to as: Reputational damage 10. Intangible property include things such as goodwill, proprietary information, and related property. True Hoofdstuk 2 1. Which of these is a type of control force used in ancient Rome? Praetorian guards 2. In what year and country did the Peshtigo fire occur? 1871, America 3. Railroad police were, and still are, a privately employed police force with full law enforcement authority. True 4. Which of these are reasons that are driving radical Islamic fundamentalism? All of the above 5. What is the importance of the Taft-Hartley act? The US president, via the attorney general, can obtain an injunction against a strike or lockout if a substantial area is affected or national security is threatened 6. Intrusion alarms are point protection only. False 7. Which of these are lessons that have been learned by studying the history of security? Both B and C -> An increase in professionalism & The need for professional training 8. Allan Pinkerton was known for which of the following unique innovations? Extensive centralized Records 9. The central alarm/dispatch operation is the brain of a security operation, serving as the command, control, and communications center. True Hoofdstuk 3 1. Which of the following best describes a protection officer? A man or a woman who concentrates on safety and security while others perform various tasks 2. The career path of a protection officer might take him through:

All the above 3. The professional protection officer has some essential characteristics. Which of the following is not one of them? Masters the use of lethal and non-lethal weapons. 4. Competency can be demonstrated through professional certifications and consist of an adequate balance of three characteristics which of the following is not one of those? Communication 5. Every decision that a protection officer makes reflects on the organizations he represents; for instance, patrol officers often times are the only people on the premises(during nights and weekends) Which of the following tasks is most unusual to a basic protection officer? Legal consultant role 6. The basic role of the protection officer is to prevent, mitigate, and respond to: Accidental and unintentional risks (safety, health, environment, and quality) 7. There are five types of critical resources to be protected; which of the following is not one of those? Time 8. The value added by a protection officers performance is measured in the level of improvement that his work brings into the organizations protective process and objectives. Examples of this can include: All of the above 9. All actions taken before active protection measures are performed can be included in the preventative functions. Which of the following is not one of those actions? Separate physically or in time the aggressor from the objective. 10. One of the steps taken during response functions performed by protection officers is recovery. Which of the following is an example of it? All the above Hoofdstuk 4 1. Leaders and supervisors are not one and the same. Our expectation is that every supervisor is a leader but not every leader is necessarily a supervisor. True 2. They key for a supervisor to get anyone to do anything is to: Get them to want to do it 3. Leadership is not about self-interest; it is about being other-person-centered. Thus, before embarking on a mission to become a leader, one should conduct a self-examination in all the following ways, except to: Assure that no one in the group will be able to pass you up and become your boss 4. An effective team member will display the following attributes: All the above 5. Traits that can characterize a leader in any organization include all the following, except: Support complacency in the ranks 6. There are numerous critical leadership skills. A leader will display all of the following skill sets, except: Learning how the mission of the organization compares to the leaders career goals 7. There are four communication skills needed for every leader. Which of the following is not one of them? Top down as a priority communications direction 8. The optimal way to communicate is written. False 9. Some experts say we conduct a vast amount of our communications nonverbally. No matter how we or other communicate nonverbally, we must always strive for clarification if we want to achieve understanding. Which of the following is true about nonverbal communications?

All the above 10. Leaders are often called upon to institute change in a department. Change is hard to accept by many subordinates because of insecurities or lack of trust. Resistance can be overcome by all of the following suggestions, except: Inform the employees that if they cannot accept the change you will help them find work elsewhere Hoofdstuk 5 1. Which of the following best describes the importance of career planning? None of the above 2. When earning an education what are the most important considerations? All of the above 3. On average, how much of a salary increase do college graduates earn over noncollege graduates? 77% 4. Why is experience such an import component of your resume? Experience provides exposure to scenarios and interaction not available in the classroom 5. On average, how many certifications should one obtain? None of the above 6. What is the difference between a functional and a chronological resume? A functional rsum is a summary of experience, whereas a chronological resume lists jobs or positions by dates of employment 7. When interviewing for a job, what preparation is necessary? All of the above 8. Why do employers search social networking sites for applicant information? Searching these sites provides a quick and efficient way to learn more about the candidate 9. There are four strategies for developing a career; choose the one that is not a strategy. List ones rsum on an online job board 10. What is one of the fastest growing fields related to security? Homeland security Hoofdstuk 6 1. Which of the following best describes effective communications? A faithful reproduction of a message sent to a receiver clearly understood and confirmed by the receiver 2. Tort law expects every business to actively pursue the following: Due diligence regarding safety and security 3. There are four channels of communications in most companies; which of the following is not a channel? Reverse-horizontal communications 4. There are six essentials of effective communications; which of the following is not one of those essentials? The communications must be consistent 5. Effective communications has built-in flexibility to facilitate the needs of the receiver or receiver groups. Which of the following characteristics is important to take into consideration? All of the above 6. A very important part of effective communications is that the communicator must be able to tell which of the following? That the message has been received and understood 7. The one misconception that causes more errors than any other in effective communications is: Every message must be brief

8. The telephone equipment in a security program must be which of the following? Choose the best answer. It must be simple to use with the least probability of failing during an emergency 9. In the security office, separate and apart from the general use telephone, there will be a red phone used exclusively for emergencies. That phone will have the following attachments to make it more effective. Which of the following is not one of those? Beeping sound every 3 seconds 10. During some emergency situations, the phone system will be destroyed, especially when there is a building collapse. What can we do to protect that phone line? All of the above Hoofdstuk 7 1. Security awareness is simply letting everyone know in the organization how security impacts them and how important they are, as stakeholders and team members, to the continued success of the company. True 2. To be effective, the security department should instill security awareness among all levels of the organization and external partners. True 3. Security awareness meetings should be held with all departments at a minimum frequency of: Quarterly 4. Security awareness should be instilled among half of the members, from all layers of the organization and external partners. False 5. In double loop communication, information should not only flow from the top of the organization but also a process should be in place for information to travel back to the top. True 6. The lessons learned examples help employees and partners understand why security awareness is important to them personally and for the success of the organization. True 7. Which is a method to increase security awareness among all layers of the organization and external partners? Interactive activities 8. Focus groups consist of: Individuals selected by management 9. When double loop communication is used, the following employees have the opportunity to become active: Stakeholders 10. Team members are trained and polled regularly to heighten their awareness about changing trends in practices and rapidly advancing technology in security. True Hoofdstuk 8 1. Magnetic contact switches, motion sensors and glass break sensors are examples of what kind of sensors. Intrusion 2. Magnetic stripe, wiegand, proximity and biometric are examples of access control readers. True 3. An advanced radio dispatch system may consist of the following: All of the above 4. A main component of a medium to large access control system is the following: Distributed processor

5. Network Attached Storage (NAS) and Storage Area Networks (SAN) are examples of large capacity storage devices used with video surveillance systems. True 6. The 10-codes are used to assist with rapid transmission of radio communications. False 7. Access control sensors may be uses to detect unauthorized access to a facility, and to generate security alarms in response. Which of the following is not one of those access control sensors: Network attached storage device 8. A transmission medium is simply the method by which an electronic message is carried. Signals may be transmitted in a variety of ways. Which of the following is not one of those mediums used to transmit electronic messages: None of the above 9. A smoke detector is a device to manually initiate a fire alarm. False 10. Gas, temperature and power failure are examples of which of the following sensors: Building automation Hoofdstuk 9 1. Automated visitor management systems should only be used in large, complex organizations with multiple facilities. False 2. One use for crime mapping is to help determine where to locate new facilities. True 3. Studies indicate that security technologies will soon make security officers obsolete. False 4. Incident Management Systems today are really nothing more than word processing systems that allow an officer to enter reports electronically. False 5. Two dangers mentioned in this chapter that protection professionals should be aware of in using online resources are (circle two): The possibility of going off on a tangent rather than focusing on the objective & Assuming that information in online database is credible 6. Among the advantages of automated visitor management systems are (circle all that apply): Ability to keep a searchable record of visitors & Ability to better account for all building occupants during an evacuation 7. A study by Bolyard and Powell concluded that security officers lacking this knowledge would be placed at a great disadvantage...What knowledge were they referring to? An orientation on automated tools such as incident and visitor management systems as well as crime mapping and analysis 8. Geographic Information Systems (GIS) are closely related to: Crime mapping systems 9. A number of studies in recent years have projected massive expansion of electronic security systems employing advanced technologies, but they also concluded that the human element (i.e., security officers) will not be predominantly replaced by technology. True 10. Technology and automation is not bringing the benefits, efficiencies, and opportunities to the field of security and asset protection that was anticipated. False

Hoofdstuk 10 1. Uniformed and paid police did not come around until which of the following:

The 1830s when Philadelphia started paying police 2. The patrol function is the lease important but necessary part of the loss control approach. False 3. Based on organizational needs, there are many major purpose of patrol. Which of the following is not one of those purpose: To perform an activity that creates the appearance of authority 4. There are basically two types of patron. Which of the following are those two types? Mobile and foot patrol 5. Preparation for a patrol tour of duty requires more than just putting on the uniform and going to work. It also requires mental and psychological preparation. True 6. If the officer is working the overnight shift, 2200 to 0600, it is advisable to do which of the following: Visit the work site during the day for facility orientation 7. There are numerous techniques that help an officer to detect unusual situations. Which of the following is one of those techniques: All of the above 8. One area of preparation often overlooked by many security departments is: Failing to provide continuing training and education 9. Which of the following is a principle of patrol that every patrol person should follow: All the above 10. There are many internal factors that can influence a patrol officers performance in a negative way. Which of the following is not one of those internal factors: Environmental conditions Hoofdstuk 11 1. The following sign is without doubt the most important sign in use today. Stop 2. Directing traffic from or at the gate would include such duties as checking. All of the above 3. On private property, the save movement of traffic is the responsibility of the security officer. True 4. When signaling a driver to stop, you hand should be: Palm open 5. Slow or timid drivers should not be urged forward with increased rapidity of arm motion because they may over-react and cause an accident. False 6. Directing traffic from the corner position is safer than a center-of-the-intersection position. True 7. Proper protection against the elements is an important factor in maintaining efficient traffic control. True 8. The primary use of the traffic whistle is to attract the police. False 9. General rules for traffic direction are: All the above 10. When on traffic control, proper equipment includes: All the above

Hoofdstuk 12 1. In controlling a hostile crowd, sufficient _______ is/are basic to you success.

Manpower 2. The protection officer should attempt to isolate an individual troublemaker by: Removing them 3. If you are observe a hostile crowd gathering, never hesitate to request additional: Assist 4. A demonstration is a crowd that is exhibiting sympathy for or against authority, or some political, economical or social condition. True 5. A riot means any extreme or catastrophic condition that imperils or result in loss of life and/ or property. False 6. The basic reason for the formation of any crowd is the occurrence of an event that is of common interest to each individual. True 7. A leaderless crowd that is attempting to flee from something it fears is a/an: Escape crowd 8. Some psychological factors in crowd formation are: All the above 9. The protection officer dealing with crowds should: Give the impression he/she will enforce orders 10. Some riot control, force deployment procedures are: Arrowhead, left and right flanking, line Hoofdstuk 13 1. Environmental crime control theory focuses upon the _______ of the crime act: Location 2. Basically the offender use a decision making process whereby the positive and negative aspects of committing a particular act is weighed. This is an example of: Rational choice theory 3. The application of situational crime prevention techniques are the results of this theory. Rational choice theory 4. There are _______ aspects of displacement? Six 5. There are three key concepts specific to CPTED. Which of the following is not one? Defensible space 6. There are _______ main categories of Situational Crime Prevention Techniques. Five 7. Further, the categories have _______ different sub-categories? Five 8. Defensible Space: Crime prevention Through Urban Design was created by: Oscar Newman 9. This revolves around public housing and seeks to reduce crime though the use of natural surveillance, natural access control and territorial concern. Defensible space 10. Routine Activity Theory, developed by Cohen and Felson, revolves around three things: which of the following is not one of the three factors? Acting under the influence of drugs or alcohol

Hoofdstuk 14 1. Risks are usually categorized into three categories. (Select one that doesnt apply).

Insurance 2. Physical security planning is a recognized security process that, if followed, will result in the selection of physical countermeasures based on appropriateness. True 3. The security planning process consists of following a selected number of steps. Five 4. Security-in-depth is also known as: Layered Protection 5. Microwave detectors use high-frequency sound waves to establish a protected area. True 6. Deadbolt locks should have a minimum of a throw. False 7. Card access system are permit accountability. True 8. The most commonly used security fencing material is: Chain-link 9. The minimum height of a security fencing should be: 7 feet 10. Which of the following types of light are only lit on an as-requires basis? Standby Hoofdstuk 15 1. In many cases, _______ from the backbone of a facilitys physical protection program. Alarm systems 2. The primary purpose of an alarm system is: To provide early warning of an intruder 3. According to the text material, the most effective security is provided with a: Layered approach 4. In more sophisticated alarm systems, sensors are interfaced with electronic entry-control device, CCTV, alarm reporting displays (both visual and audible), and _______. Security lighting 5. How many different types of alarm monitoring were examined in the text? Four 6. Which of the following is not a type of alarm monitoring? Satellite 7. Logging device are used for: Recording systems activities and faults 8. Alarm printers are typically: Of the high-speed, continuous-feed type 9. A glass-break sensor is an example of: A perimeter sensor 10. A duress alarm is also sometimes called: A panic button Hoofdstuk 16 1. The task of performing effective Access Control includes record _______. Keeping 2. Signing in at a security _______ is a common function of controlling access. Register 3. _______ of regular occupants to a facility is considered a very secure form of access control. Recognition

4. There needs to exist a clear policy for the denial of _______ for individuals without proper credentials. Access 5. The effectiveness of physical security is further enhanced by strict _______control. Key 6. _______ key blanks can have a restricted issue to one distributor or end user. Proprietary 7. The feature of access control systems operating off-line and not connected to a host computer is often referred to as _______ or offline mode. Degraded 8. Smartcards have the ability to store a biometric _______ among other types of information. Template 9. _______ _______ _______ is an effective alternative to manually searching airline passengers. Millimeter Wave Scanning 10. Biometric technology is slowly being removed from usage in airports and other immigration checkpoints. False Hoofdstuk 17 1. How many suspect components of an explosive device are needed to warrant a possible threat? Two 2. Which component is not considered a basic component of an explosive device? Projectile 3. Which of the following is considered to be a downside to using detection dogs? Unprofessional behavior by a dog and its handler may ruin the companys reputation 4. A magnetometer is a kind of metal detector that detects: Ferromagnetic Material 5. Which of the following is not a metal detection technology used prominently in security applications? CT Scan 6. Which chemical compound does chemiluminescence technology detect? Nitrogen dioxide 7. The selection of detection equipment should be based on: All of the above 8. Electronic article surveillance (EAS) systems are used to detect: Fraudulent activity 9. When responding to an alarm, it is important to: Abide by company policy and procedure 10. Which of the following is not a consideration when using X-ray detection technologies? Training new operators is lengthy and expensive Hoofdstuk 18 1. One component of the fire triangle is heat. True 2. Class A fires are those involving alcohol as the fuel. False 3. Fighting a fire with an extinguisher is very safe. False 4. Human life and safety should be the primary concerns in fire situations. True

5. Fire plans should include: All of the above 6. The detection of fire can be broken into: Both of the above -> Electronic methods & Human Methods 7. Arson fire are: All of the above 8. Typical hazard areas include: All of the above 9. Dry chemical hand extinguishers are usually considered: All of the above 10. A magnesium fire is an example of a Class B Fire. False Hoofdstuk 19 1. The disciplines of safety and security are dissimilar. They dont share the same common objectives in terms of the overall protection process. False 2. The protection officer must take continuing education in HAZMAT and first aid. True 3. The World Health Organization has defined health as more than just the absence of disease. True 4. One aspect of a formal safety policy is to prevent accidents and illness on and off the job. False 5. One of the main functions of a safety committee is to administer effective rescue training programs. False 6. The safety committee has the authority to make safety recommendations to management. True 7. The protection officer should carefully inspect the work habits of members of the workforce and report deficiencies detected. True 8. A safety program that initiates regular safety inspections(audits) demonstrates to employees: Managements interest in accident prevention 9. When a safety recommendation made by an employee is acted upon: Management recognizes the employees contribution to the safety program 10. A safety checklist is useful because(check best answers): All of the above Hoofdstuk 20 1. Hazardous material is well defined and easily identifiable. False 2. The emergency response guide is updated and reprinted on a 5-year cycle. False 3. Always approach hazardous material incidents from upwind, uphill or upstream. True 4. In a crisis involving the release of a hazardous material, the first thing that must be done is to identify what has been released in what quantity. True 5. The stand response protocol consists of three consecutive steps. The correct order of these steps is: Identify the material, activate the appropriate contingency plan, perform site security

6. There are several ways to determine what hazardous material has been released in an employee-related spill, but the best way is to: Ask the person who was using it 7. There is a standard that should be used for preparing an MSDS. True 8. The media present unique challenges for site security personnel. True 9. The most comprehensive and detailed information concerning a specific hazard would be found in the: Emergency Response Guide 10. The fumes from hazardous materials release have been known to carry 20 miles or more. True Hoofdstuk 21 1. Computer security, information security, and information technology (IT) security all mean the same thing and are interchangeable terms. False 2. Counterintelligence is an important function and can be applied in private sector companies as well as in government agencies. True 3. Legal measures are generally reactive rather than proactive in nature. True 4. According to consultant Michael Moberly, approximately what percentage of a companys value generally lies in information and intangible assets? 75% 5. The practice of asset protection focuses on which categories of assets? (Circle all that apply.) Information & People & Property 6. Which of the following is NOT a characteristic of the Economics Espionage Act of 1996? It must be updated every 5 years 7. According to this chapter, the field of information security includes: IT security 8. When an information loss is known or suspected, the following actions should be taken: Determine root cause 9. Information that is lost is not permanently lost. False 10. An important tool is protecting information assets is the Economic Espionage Act (EEA) of 1996. True Hoofdstuk 22 1. Which of the following is not relevant to general deterrence? Punishment carnality 2. Routine activity theory states that crime will only happen when a motivated offender, a suitable target, and the absence of _______ occur at the same place and time. Capable guardians 3. Social learning theory is only about learning how to commit a crime, not why crime might be acceptable. False 4. Which of the following is an example of a technique of neutralization that would be used if the employee believed the company would get insurance money to replace the loss? Denial of injury 5. Which step must immediately follow observation of suspicious activity?

Reporting 6. Liaison with nonsecurity employees has many benefits for the protection officer. True 7. Protection officers may visit any office or activity without notice and at the officers convenience. False 8. Employee package policies usually include: Either a or b 9. Suspicious activity should be reported only in writing. False 10. Reporting observations to the right person or persons is vital. True Hoofdstuk 23 1. Drug dependence is a primary disease. True 2. Which of the following applies to drug dependence? All of the above 3. The biggest single roadblock to addressing a persons substance abuse problem is their drug of choice. False 4. A company can effectively fight substance abuse by just starting a drug testing program. False 5. A person who does not use drugs, but is preoccupied with a loved one who does, is said to be codependent. True 6. The first step in developing a Drug-Free Workplace Program is to: Write a policy 7. The most widely used drug testing material is use today is: Urine 8. Psychoactive drugs affect which of the following: Brain 9. Nicotine and marijuana are referred to as which of the following: The most dangerous drug 10. The protection officer is to take which of the following actions in reference to substance abuse behavior in the workplace: Observe and report to your up line Hoofdstuk 24 1. Workplace violence is broadly defined as the use of violence against workers. True 2. xx 3. Workplace violence can occur in almost every workplace: small business, large companies, government facilities. True 4. An employee who exhibits rude manners toward his or her fellow workers is a definite workplace violence threat. False 5. In a 2006 survey conducted by the Bureau of Labor Statistics, U.S. Department of Labor, for the National Institute of Occupational Safety and Health, Centers for Disease Control, what percentage of workplace violence events were perpetrated by coworkers? 34,1%

6. There are many effects of workplaces violence on an organization. Find the most correct group of effect below. Interruption to business, Increased legal/medical fees, Loss of productivity, Repair/replacement of equipment/facilities 7. Although the 2006 survey discussed in this section indicated that 51,4% of responds reported that workplace violence events had no effect on their workplace, 29,7% reported that this effect was observed: Fear levels 8. Examples of workplace violence situations are: All the above 9. According to this chapter, the generally recognized primary objective of a security program is the protection of: People, property and information 10. According to this chapter, a very small percentage of employees who have violent propensities will actually perform a violent crime. True Hoofdstuk 25 1. This is often referred as the silent killer. Stress 2. When you lose your _______, someone else has control over you. Temper 3. Some rules for settings limits are to: All of the above 4. Being complacent during a crisis situation is good; is allows the individual not to know what you are thinking. False 5. The best stance during a crises situation is just off the side at an angle. True 6. Indistinct signs of possible physical acting out, such as gritting teeth, closing and opening of hands, and tensing, may precede more combative behavior. True 7. Experts say that 7 15% of the messages we convey are nonverbal. False 8. Paraverbal communications how we deliver our words of verbal intervention includes which of the following? All the above 9. Persons who are behaving in a physically violent manner may be controlled in all of the following ways except: Challenged 10. When involved in a one-on-one situation, the first action taken should be: Be sure assistance is en route Hoofdstuk 26 1. Labor relations include the employee/employer relations dealing with matters pertaining to which of the following activities: Collective bargaining and associated activities 2. The role of the protection officer has an influence on the labor relations climate at any given company. Which of the following activities does the protection officer influence: All the above 3. Which of the following is a legal move by management to put pressure on the unions: Lockout

4. A wildcat strike is a legal strike. False 5. Work stoppages as a result of labor relations difficulties will arise when union officials order production limitations. True 6. The protection officer should be aware of the types of discipline available to his employer because: Discipline is an effective deterrent 7. Which of the following is not illegal during a legal strike? Carrying placards 8. An incident of theft whereby an employee is discharged can become an issue in: All the above 9. The strike plan is designed and updated to eliminate problems that occur during a strike and provide guidelines for security and management. True 10. When stopped at a picket line in your vehicle, you should: Remain in the vehicle and proceed with caution Hoofdstuk 27 1. The terms threat and risk can be used interchangeably; for example, a threat assessment is the same as a risk assessment. True 2. The concept of risk management originated within the security profession. False 3. Because vulnerabilities are actually a characteristic of the organization or facility, they are: The risk factor over which the organization has the most control 4. According to Primer on Security Risk Management, the primary categories of threats are (circle all correct answers): Intentional & Inadvertent & Natural 5. In a scatter chart used for risk analysis, which quadrant represents a high-likelihood/highconsequence risk? Quadrant 1 6. In order to effectively mitigate risk, a security professional should: Apply a protection strategy that employs a suite of solutions 7. Buying insurance is one example of: Risk transfer 8. Which one of the following is not one of the underlying concepts on which a risk mitigation strategy should be based? Quantitative analysis 9. Risk management is a critical process that touches every aspect of organizational asset protection and the activities of the professional protection officer. True 10. Service providers should not base their core business on risk management principles. False

Hoofdstuk 28 1. Regardless of the type of crises, there is a series of common requirements that must be taken into account for an organization to be successful when a critical incident occurs. These include all the following except: Being willing to spend lots of money on a solution

2. Observing which of the following guidelines increases the chances that emergency plans will be more effective and efficient: None of the above 3. The National Fire Protection Association (NFPA) standard 1600 sets criteria for both developing and evaluating existing emergency management programs. True 4. The Incident Command System (ICS) indentified common concepts that form the basis for the control and management of emergencies. Which of the following is not one of those concepts: Concentricity 5. The National Response Framework (NRF) established and on-scene management system that would help responding agencies work together using a coordinated and systematic approach that can be used for all types of incident regardless of size. False 6. The ICS structure is built around five major management activities of functions. Which of the following is not one of these functions: Safety 7. The National Incident Management System (NIMS) provides a systematic, proactive, allhazards approach that guides all levels of government, non-governmental organizations, and the private sector to work together to respond to and manage incidents of all sizes. True 8. Effective crisis media communications steps that organizations should consider include all the following except: Develop strict restrictions on what media can do on your property 9. An emergency response plan will work regardless of any realistic training prior to the implementation in an actual emergency. False 10. In addition to a yearly audit of the emergency plan, that plan should be evaluated and modified, is necessary, at all of the following times except: None of the above Hoofdstuk 29 1. Historically, the term terrorist can be traced to 1975. True 2. As a security professional it is often less important to classify a potential threat as terrorism of crime than to indentify and address the threat itself. True 3. The worst terrorist act on U.S. soil was the bombing of the Murrah Federal Building in Oklahoma City of April 19, 1995. False 4. The acroynom ELF refers to: Earth Liberation Front 5. The smallest sized cell is: Individual 6. The CARVER model of target selection offers a useful tool for considering a target. True 7. A security professional need only concentrate on their own facility when coping with terrorism. False 8. Formal threat assessments are certainly important, however, regularly monitoring of the environment offers the opportunity to identify potential problems earlier. True 9. An example of a non-violent extremist might be an animal rights supporter that uses no animal products at all.

True 10. It is impossible to identify potential targets. False Hoofdstuk 30 1. Personal protection specialist should attempt to stand out as obvious security personnel in the principals entourage so people know whom to rely on in an emergency. False 2. Personal protection specialist should only worry about assassins and kidnappers, since common criminals are unlikely to attack a VIP. False 3. A principal is about to enter a room; a protection specialist should enter the room before the protectee to make sure it is safe and consider closing the blinds to prevent outside adversaries from observing activity in the room. True 4. When in the presence of a hostage taker or other violence-prone individual you should attempt to take what actions? Remain calm, use your first name, and cooperate with the hostage takers 5. There has been a hostage-taking in a building on your employers property. What items of information would be valuable to hostage response teams? All the above 6. A polite respectful approach will make those being searched more cooperative with a search officer and make the search more effective. True 7. Searches should be conducted randomly without a pattern that can be detected by adversaries. True 8. Counterterrorist security personnel should read and become intimately familiar with detection equipment manuals, calibration techniques, and capabilities. True 9. Terrorist groups frequently attempt to infiltrate a facilitys workforce, including the security department, prior to conducting an attack. True 10. Which of the following is the least agreeable time to detect a terrorist plot? When the terrorist arrive at the site to conduct the attack Hoofdstuk 31 1. Accident investigations can be investigated by any of the following except: Federal or state agency investigators 2. The foundation of a good report lies in and begins with: Notes and reports 3. Weingarten established the Exclusionary Rule, which prohibits statements made in violation of the law from being used in a criminal court: False 4. A case effort undertaken in cooperation with other organizations is called: Liaison 5. Which of the following is a good investigative interviewing technique? Request that the subject tell the story multiple times 6. All except which of the following is a key step in preliminary investigation? Detaining those who have committed the crime 7. Informants are a very expensive and risky method to use:

False 8. An officer can testify in several different legal arenas for a single case: True 9. On-the-job visits can be used to evaluate investigations: False 10. The single overarching goal of all investigations is: To discover facts about a situation, person, or behavior Hoofdstuk 32 1. The security officers responsibilities when arriving at a crime scene is which of the following: All the above 2. To track loss-event-occurrences, the organization needs to know all of the following except? How long was it lost 3. Physical evidence found at the crime scene may explain what exactly happened and/or provide a list of suspects. Which of the following is not an item of physical evidence found at a crime scene? Low levels of C02 in the soil samples 4. If it is imperative that evidence at a crime scene is recovered and protected by the security officer, which of the following is are commended procedure? Keep individual items separate so they do not contaminate each other 5. When writing a report from your notes, which of the following will not be included: Your best interpretation of why the incident happened 6. Which of the following is the rst responding officer responsible for at the crime scene: Take emergency actions necessary to preserve life and protect property 7. Once the protection officer arrives on the scene, the rst priority is to: Provide rst aid and call for assistance 8. The scene of a crime or incident will always require a boundary using police tape. True 9. The boundaries of a crime scene will be immediately evident once the protection officer arrives on the scene. False 10. It is necessary to establish the boundaries of a crime scene before an investigation can begin. True Hoofdstuk 33 1. When an incident or crime occurs, the responding protection officer is expected to protect the scene until investigators arrive. True 2. It is important that a protection ofcer understands the importance of statements, whether written or verbal. True 3. Interviewing people is NOT the best way to gather information as there are many other more effective methods and resources. False 4. Nonverbal communication is the most commonly understood form of interviewing. False 5. Tension will often cause speech to become more rapid and stammered sometimes ______times the normal speed. 2 3 times 6. Avoid close-ended questions that will typically require a simple yes or no response. True 7. Guidelines for written statements may include:

All of the above 8. Deception can take additional forms other than what some may immediately think is a lie or untruthful statement. True 9. When the protection ofcer concludes the interview they should make detailed notes of the following: All the above 10. The protection ofcer should continue with a professional demeanor when dealing with: All the above Hoofdstuk 34 1. Covert operations are intended not to be known or recognized. True 2. Personal operations are the least expensive in the long run. False 3. Equipment requirements vary depending on the location, nature, and goal of the operation. True 4. A proper understanding of privacy issues is only important if the case goes to court. False 5. Electronic surveillance could include: All of the above 6. Considerations for the retention of record should include: All of the above 7. Overt personal surveillance: Could deter some incidents 8. A simple camera surveillance system will often include: All of the above 9. In some states/provinces/countries, recording a telephone conversation may not be done without the prior knowledge and consent of both parties on that call. True 10. If storage space becomes an issue, it might be that noncritical materials have to be discarded. True Hoofdstuk 35 1. Incidents must always be written in a way that shows the organization in a favorable manner. False 2. Verbal reports are equally as reliable as written reports. False 3. There are six (6) questions that every report must attempt to answer and they include: Who, What, Where, When, Why. What is the additional question? How 4. The three (3) Cs of report writing are: Clear, Complete and Concise 5. It is important to state your opinion in incident reports to ensure that management can gure out what really occurred. False 6. Incident reports must be treated as legal documents. True 7. Field notes are equivalent to incident reports. False 8. Writing a report is one of the most important duties of a security professional. True

9. A good rule to follow is: If it is an uncommon event, then report it. True 10. A good acronym to remember when it comes to writing reports is H.U.G. False Hoofdstuk 36 1. A protection officer may force a search of an employee where there is a company policy. False 2. A store can be liable for the actions of its protection officer if it can be proven that the officer was: Their agent 3. A person can be convicted on circumstantial evidence alone. True 4. If a law is not written down and passed by government it is not a law. False 5. The purpose of our legal system is to: All of the above 6. The common law is not used in North America today. True 7. You cannot sue someone and press criminal charges. It is double jeopardy. False 8. At criminal trials, the prosecutor must prove the accused guilty: Beyond a reasonable doubt 9. The police will investigate: Criminal matters 10. A confession may not be admissible in court unless it can be shown that (check all that apply). There was no promises Hoofdstuk 37 1. Force is any touching of another person. True 2. Using force is generally the first option that an officer chooses when managing the behavior of others. False 3. Persons that force is used against must demonstrate that they have the _______ to cause injury, that they manifest intent to do so, and that they are placing the officer in imminent jeopardy. Means 4. _______ means that officers must show that they had no other alternative than to use force. Preclusion 5. Objects of materials that protect one from bullets or other projectiles as rocks that are thrown is: Cover 6. Control = _______/emotions. Intellect 7. The security officer must use alternative use of force whenever possible. Which of the following is an alternative to the use of force: All of the above 8. There are five primary justifications for using force. Which of the following is not one of them? That the aggressor was known to be a troublemaker

9. The following are three recommendations on how to safely manage violence prone encounters. There is also one recommendation that you should never try. Which one is the recommendations you should never try? Do now waste time evaluating the situation; react immediately before anyone gets hurts 10. Report writing after a use of force is very important. What the officer writes of fails to write can get that officer in trouble if the subject decides to bring a lawsuit. Therefore, remember that you may be writing to the lawyers, a judge, or a jury in a civil lawsuit. While writing the incident report, the officer must include all the following, except: If the subject was injured, be sure to state that you accidently injured the subject; is was not intended Hoofdstuk 38 1. Caution should be used at all times. True 2. Additional support will never be required if you are cautious. False 3. It is always wrong to withdraw from a situation. False 4. Firearms are the final phase (highest level) of the range of response. True 5. The critical factors when designing a training programs are: Both a and b -> Realism & Repetition 6. The possession and use of weapon are dependent upon which policies? All of the above 7. The three basic factors of combat include: Control over space 8. Points of consideration when entering into physical confrontation include: All of the above 9. Never get close to an aggressor, no matter what the weapon. True 10. Training that is going to help every day in a security job is: All of the above Hoofdstuk 39 1. The definition of a hazard specifies those conditions in the physical or natural environment which can harm the security. False 2. An example of workplace violence may include when a security officer is surprised and attacked by a buckler in a warehouse. True 3. Environmental risks are unavoidable regardless of the officers training and self awareness. True 4. Most injuries to security officers are a result of falls. False 5. The security officer must make personal choices in health and fitness to help them adjust to a hazardous environment. True 6. A security officers supervisor or a member of facility management should be relied upon to indentify and communicate all hazardous conditions. False 7. Risk assessment is a thorough, comprehensive, and ongoing evaluation of the key assets, threats, hazards, vulnerabilities, and procedures in place to protect a facility from loss.

True 8. Risky behavior or improper operation of equipment by the security officer are a few examples of environmental hazards. False 9. The most important asset that should be protected within a facility is the security command post. False 10. Durable, safe, comfortable footwear is a key piece of personal safety equipment for the industrial security officer. True Hoofdstuk 40 1. Blacks Law Dictionary defines an arrest as: To deprive a person of his liberty by legal authority. True 2. In order for an arrest to be legal and binding, the person making the arrest and the person being arrested have to know: The authority to arrest is real 3. Security officers do not have the same authority to make an arrest as a citizen unless some special circumstances exist. False 4. Based on the circumstances a private person may make an arrest for which of the following offenses: All the above 5. Authorization to make an arrest will come from all the following places except: The local Police Department 6. Contrary to popular belief, at least in most jurisdictions, you do not have a touch someone to be looking at a criminal assault charge. You only have to place another person in a reasonable fear of being battered. True 7. Assault is the intentional touching of someone in a non-consensual, non-privileged manner. False 8. Guilt in civil court requires what percentages of proof? More than 51% 9. Malicious prosecution happens when a security officer detains someone with the full intention of bringing criminal charges against them, of filing criminal charges without probable cause. False 10. Under law everyone has the right to defend themselves. True Hoofdstuk 41 1. In a multicultural World, what type of language must a protection officer use to gain the trust of their audience? Inclusive 2. The protection officers ability to effectively communicate will also be enhanced by _______ listening. Active 3. In a multicultural world, leadership ability can determine if a protection officer has the aptitude and capacity to protect their customer. False

4. Future policing will depend in large part on the type of society being policed the _______, _______, _______ realities and, in more developed countries, the technological sophistication of the populace. Ethical, political and multicultural 5. Globalization has grown largely due the lowering of shipping costs. False 6. Sexual harassment has traditionally taken the form of a hostile environment. False 7. Women in protection are taking on more leadership roles than ever before. There is, however, a _______ ceiling that prevents them from being promoted beyond a certain level. Glass 8. The first female investigator was Kate Warne. True 9. Racial profiling in retail is counterproductive as it: All of the above 10. Supply chain security is a rapidly growing area for both corporations and government. True Hoofdstuk 42 1. No matter what the security officers primary duties and responsibilities are, and no matter who the security officers primary constituency is, which of the following people groups have a legitimate interest in how those duties and responsibilities are carried out? All of the above 2. There is more to department of the security officer than looking professional, and performing in a reasonable and necessary manner. The security officer must have all the following characteristics but one. Which one of the following is not mentioned in the text? The security officer must appear to have real concern for others 3. To accomplish the goal of projecting a positive image, the security department must first have a quality program in place. Once this one, the Ten Rules of Public Relations in Private Security can be applied. Which of the following is not one of these rules? The Security Officer must select the persons he or she will serve 4. In addition, the Ten Rules of Public Relations in Private Security instruct the security officers in the following ways. Which one of the following rules is incorrect? When the person you are serving only wants to argumentative, you must cut them off cold and take over the conversation 5. There are many actions that a security supervisor can take to motivate their subordinates to do a better job at public relations. Which of the following is not one of those actions? Give each officer extended smoke breaks as a reward for a job well done 6. In addition to daily refresher training, supervisors should make certain that the security officers in his or her command adopt favorable work behaviors. Of the following work behaviors, which is not included in the text? The security officer should be schooled in money management so they will be able to live very comfortably on the wages they receive from being a guard 7. Handling customer complaints is not always fun. In some cases, the security officer may wind up acting like a referee. Of the following, which is a good recommendation for how to handle complaints? All of the above 8. Security departments are service departments. The personnel in security departments can be found doing all kinds of jobs to help their companies. Of the following activities that security officers might be asked to do, which is not likely a task they will follow? Lining up catering services for the CEOs annual vice presidents meeting and golf outing

9. By performing a risk analysis, the security department is placing itself in a security consulting relationship whit the company. Risk analysis can also help with loss control efforts. Which of the following is not a setting where a risk analysis would be very helpful? None of the above 10. Whenever a facility has a critical fire, explosion, or another cataclysmic event, the media is sure to be there. When they arrive, they will attempt to interview the first person they see so they can get the story on the evening news. Many times, that person is the security officer. Which of the following is a good idea of how the security officer should respond? Never, never, never, under any circumstances, give an interview Hoofdstuk 43 1. The society that wants to buy what they buy based on the thrill derived from the item purchased is an example of which of the following types of economy: Experience economy 2. Creating a positive experience involves being effective in which of the following: All of the above 3. Total quality costs include all the following except: High federal tax cost 4. In a service-related business, such as security, total quality costs can be significantly reduced by providing which of the following: All of the above 5. The operations brand is a function of all of the experiences, as we explored above, perceived by the various users of its services with whom the operation comes in contact. It is more than just a logo on a letterhead, it is also which of the following: All of the above 6. Branding is about the image of the operation at every touch point, at every single place anyone has any contact whatsoever with the operation. True 7. Our account representative, our executives, even our officers should interact with our client or overseeing executive as though: All of the above 8. Almost every complaint presents some: Opportunity for improvement 9. The key to your success lies in your ability to build which of the following with the communities in which you serve. (Choose the best answer.) A sense of profit for your company 10. The next type of economy, after the experience economy, will be the transformation economy. True Hoofdstuk 44 1. Contacts made outside your company with other professionals tend to enhance both the security operation as well as the security professional. Professional liaison relationships can come from all the following except: Colleagues you work with on the job every day 2. The elements of VIP protection include protective detail, access control, armored limousines, and fire arms proficiency. False 3. Performing duties professionally when VIPs are in the area creates an opportunity for security personnel to be noticed by some very influential observers. False 4. When emergency situations occur, the first responding security officer is expected to take certain emergency steps. When public assistance arrives, what they find can bring recognition

5.

6. 7.

8. 9.

10.

for that first responding security officer. Which of the following is one of those recognition tasks: Clear the area of all non-emergency persons, secure the incident scene providing an unobstructed work area, and report conditions to management Which of the following are good contacts for the security professional to make contact with because they offer the best opportunity to form long lasting relationships with: All of the above Networking relationships are valuable because they can lead to training opportunities. True As for fire emergencies, security personnel might be in a position to assist the responding police officers hence forging positive relationships with local law enforcement. Detectives from that same police department may arrive asking for additional help providing even a further opportunity for valuable contact development. Which of the following are ways to be of assistance: All of the above A relationship with police investigators might lead to which of the following: Training opportunities Professional development groups, like the IFPO and ASIS International, can also introduce a wide variety of professionals with whom a liaison-type relationship is beneficial. True Every large company in the United States employs instructors in the security discipline that have had real-world experience. This provides future opportunities for security professionals with good networking capabilities. True

Hoofdstuk 45 1. What is the greatest issue in public safety? Private security 2. _______ are how one carries themselves, conduct, and ones attitude of image. Deportment 3. Where do most poor decisions emerge from? Failure to explore all potential options 4. There is substantial legal leeway concerning the amount of force that can be used to restrain a patient. This is an ethical issue in protection. True 5. Professionals think in terms of their authority. False 6. Using the _______ acronym can assist one in dealing with ethical dilemmas. PORT 7. _______ may be established by statute, custom, or contract. Rights 8. Taking shortcuts are one reason why unethical behavior occurs. True 9. Traditionalism is _______ to change. Resistance 10. The world of asset protection is black and white. There is no gray area. False

También podría gustarte