What process does a security manager use in establishing priorities in the protection of assets?

What process does a security manager use in establishing priorities in the protection of assets?A . Audit surveyB . Security surveyC . Risk analysis or assessmentD . Inspection reviewE . Both b and cF . All of the aboveView AnswerAnswer: E

June 14, 2019 No Comments READ MORE +

The rule that states that approximately one in ten applications will have major omissions, which will require going back to the applicant, is called:

The rule that states that approximately one in ten applications will have major omissions, which will require going back to the applicant, is called:A . The Rule of TenB . The Rule of NineC . The 1-10 RuleD . The Verification RuleE . Sullivan's RuleView AnswerAnswer: A

June 14, 2019 No Comments READ MORE +

The Secretary of Defense is not authorized to act on behalf of the following agency or department in rendering industrial security services:

The Secretary of Defense is not authorized to act on behalf of the following agency or department in rendering industrial security services:A . Department of CommerceB . Central Intelligence AgencyC . Department of JusticeD . Department of LaborE . None of the aboveView AnswerAnswer: B

June 14, 2019 No Comments READ MORE +

A sentry dog normally does not perform as well at:

A sentry dog normally does not perform as well at:A . Radar sitesB . WarehousesC . Gasoline storage areasD . Ammunition storage areasE . Offices containing classified materialsView AnswerAnswer: C

June 14, 2019 No Comments READ MORE +

Which of the following is not a correct statement as a general rule involving the protection of proprietary information?

Which of the following is not a correct statement as a general rule involving the protection of proprietary information?A . As a class, employees are the largest group of persons bound to secrecy because of their status or relationshipB . By operation of common law, employees are presumed to be...

June 14, 2019 No Comments READ MORE +

Hashish mainly comes from:

Hashish mainly comes from:A . PeruB . ChileC . ColombiaD . South AfricaE . The Middle EastView AnswerAnswer: E

June 13, 2019 No Comments READ MORE +

Background investigations of an applicant should:

Background investigations of an applicant should:A . Be based on the application and an interview record formB . Be done by a carefully screened investigatorC . Be conducted without any prior contact from the applicant by the investigatorD . All of the aboveE . None of the aboveView AnswerAnswer: D

June 13, 2019 No Comments READ MORE +

A microphone that requires no power source, is very small, and is difficult to detect has the characteristics of a(n):

A microphone that requires no power source, is very small, and is difficult to detect has the characteristics of a(n):A . Contact microphoneB . Parabolic microphoneC . Dynamic microphoneD . Infinity microphoneE . None of the aboveView AnswerAnswer: C

June 13, 2019 No Comments READ MORE +

Which of the following is not true in regard to establishing and identifying personnel to control movement?

Which of the following is not true in regard to establishing and identifying personnel to control movement?A . The identification card should be designed as simply as possible.B . Detailed instructions should be disseminated as to where, when, and how badges should be worn.C . Procedures should be designed to...

June 13, 2019 No Comments READ MORE +

Which of the following should be part of an effective information security program?

Which of the following should be part of an effective information security program?A . Pre-employment screeningB . Nondisclosure agreements from employeesC . Employee awareness programsD . Policy and procedural statements on the recognition, classification, and handling of sensitive informationE . All of the aboveView AnswerAnswer: E

June 13, 2019 No Comments READ MORE +