• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/221

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

221 Cards in this Set

  • Front
  • Back

Which of the following is checked on a retina scan?

Blood vessels

Which of the following is the weakest point in a personnel identi- fication system

People

Fires involving wood, cloth, paper, or rubber where water is used to quench the fire and cool the material below its ignition tempera- ture are classified as which of the following?

Class A

When using biometric devices, which of the following is the improper rejection of a valid user?

Type I


False rejection rate (FRR)

Which of the following are not structural or man-made barriers?

Cliffs

Which of the following is not a level of security:


a. Minimum security


b. Low-level security


c. High-level security


d. Lack of security


e. Maximum security

ANS - Lack of security

When using biometric devices, which of the following is the improper acceptance of an unauthorized user?


a. Type II


b. False acceptance rate (FAR)


c. Type I


d. False rejection rate (FRR)


e. Answers a and b

ANS - a and b

Risk transfer is:

ANS - d. Removing the vulnerability or risk to the company for the pro-


tection of an insurance policy

Risk reduction is:

ANS - a. After identifying vulnerability or risk, implementing counter-


measures to reduce the problem

This type of fire involves certain combustible metal, such as mag- nesium, sodium, potassium, and their alloys. A special dry powder that has a special smothering and coating agent should be used and


is not suited for use on other classes of fires.

ANS - d. Class D

Self-assumption is:

ANS- Planning for an eventual loss without the protection of insurance

Which of the following is not an energy barrier?


a. Continuous


b. Standby


c. Moveable


d. Immoveable


e. Emergency

ANS- Immoveable

This type of fire usually involves a class A or B fire but also involves energized electrical equipment. A nonenergized agent is vital. When the agent melts, it forms an oxygen coating over the burning materials to suffocate them. Water and foam should not be used, because they can be conductive

ANS - Class C

Which of the following are not natural barriers?


a. Mountains


b. Deserts and plains


c. Moats


d. Cliffs


e. Water-covered areas (for example, around Alcatraz prison)

ANS - c. Moats

Risk avoidance is:

ANS - Removing the problem by eliminating the vulnerability or risk

The type of fire involving flammable or combustible liquids, gases, and greases, including gasoline, oil, paint, etc., where smothering action is required that interrupts the fuel oxygen of the heat tri- angle is classified as which of the following?

ANS - Class B

Which of the following are not human barriers?


a. Security guards


b. Patrol units


c. Guard dogs


d. Body guards


e. Military troops

ANS - c. Guard dogs

Risk can be defined as:

ANS - A situation involving exposure to danger


- The possibility that something unpleasant will happen


- A person or thing causing a risk that exposes others to danger or loss

One of management’s most valuable tools is:

ANS - Security survey

specially constructed microphone attached directly to an object


or surface to be protected and that responds only when the pro- tected object or surface is disturbed is known as a:

Ans - Contact microphone

A visual indicator that shows from which of several zones or build- ings an alarm signal has originated is called a(n):

ANS - Annunciator

A personal identification method based on the length of each fin- ger of one hand from base to tip and the width of the hand inside the thumb is called the:

ANS - Hand geometry identification c.

The guard’s primary record of significant events affecting facility protection is called the:

ANS - Guard log

Which of the following should be a required criterion of post orders?

ANS - The order should be written at the lowest level possible.

The most important written instructions for the guard force are known as:

ANS - Post orders

The argument usually used by contract guard representatives as a selling point in their service is:

ANS - The reduction in cost

One of the main reasons for not arming private security guards is:

ANS - The typical business or government facility is not customarily a place where violent crime occurs

Usually, in facilities where visitors are to be escorted, this is done by:

ANS - Individuals being visited

Each guard post that is manned 24 h/day, 7 days a week requires:

ANS - Four and a half guards

Which of the following is not an authentic characteristic of the guard operation?


a. Guards are costly.visual indicator that displays several zones or buildings from


b. Guards are generally recognized as an essential element in the protection of assets and personnel.


c. Guards are the only element of protection that can be depended upon to give complete security.


d. Guards can also perform as a public relations representative when properly trained.

ANS - c. Guards are the only element of protection that can be depended upon to give complete security.

Lighting units of four general types are used for protective lighting systems. Which of the following is not used:


a. Continuous


b. Intermittent


c. Standby


d. Moveable

ANS - b. Intermittent

The process used by the security manager in establishing priorities of protection of assets is known as?

ANS - Vulnerability study

The degree of protection desired in any installation is predicated upon an analysis of the following two factors:

ANS - Criticality and vulnerability

Which of the following is true regarding CCTV?


a. CCTVs reduce the amount of security personnel assigned to monitor entrances and exits.


b. CCTVs are effective for control of personnel at entrances.


c. CCTVs can be used as a psychological deterrent.


d. CCTVs are equipped with pan/tilt/zoom and digital recording features.


e. Both a and b.


f. All of the above.

ANS - f. All of the above.

An alarm system that is monitored by security personnel under the control of the owner of the establishment being protected is known as a(n):

ANS - Proprietary alarm

An alarm system that uses a sound- or light-generating device, such as a bell or strobe lights, located on the exterior wall of the protective area to call attention to a violation is known as a(n):

ANS- Local alarm

The type of sensor that is not influenced by exterior noise, reacts only to movement within a protected area, and can also be adjusted to the movement of air caused by a fire to activate the alarm is known as a(n):

ANS- Ultrasonic sensor

The sound wave sensor is commonly referred to as a(n):

ANS - Ultrasonic detector

The kind of sensor that is based on the Doppler principle, named after the Austrian scientist who originated the concept, is a(n):

ANS- Microwave sensor

Which of the following does not pertain to the foil-type sensor? a. The cost of installation is cheap.


b. The cost of the sensor is cheap.


c. It acts as a psychological deterrent.


d. It is subject to false alarms because of breaks.


e. Small cracks in the tape, or foil, will disable it.

ANS- a. The cost of installation is cheap.

The type of sensor that is designed to place a current-carrying conductor between an intruder and an area to be protected is known as a(n):

ANS - Electromechanical sensor

Foil used as a detector on a glass window to signal a surreptitious or forcible entry is an example of a(n):

ANS - Electromechanical sensor

The sensor that is used when light air turbulence, vibration, or motion is present outside the room is a(n):

ANS - Acoustic detector

The sensor that is used when air turbulence is present in the room being protected and when there are no potential false- alarm sources outside the room and in the field of the detector is a(n):

ANS - Microwave motion detector

UL standards for the resistance to picking to align tumblers should be at least:

ANS - 10 min

The best-known performance standard for guidance on the criteria of effective locking systems is published by:

ANS - Underwriters Laboratories

The most widely used lock in the United States today for exterior building doors and interior room doors is:

ANS - The pin-tumbler lock

The lock that is mostly used today for cabinets, lockers, and safe- deposit boxes is:

ANS - The lever lock

Which of the following locks has been in use the longest and has no security value?

ANS - The warded lock

The most widely used security device is:

ANS - A lock-and-key device

The type of glass that is often used for both safety and security purposes because it is three to five times stronger than regular glass and five times as resistant to heat is:

ANS - Tempered glass

What type of glass would be better for a storefront in terms of resistance to breakage, resistance to heat or extreme cold, and resistance to overall deterioration?

ANS - Acrylic material

Bullet-resistant glass is made of:

ANS- Laminated glass

Two sheets of ordinary glass bonded to an intervening layer of plastic material that is used in street-level windows and displays that need extra security is known as:

ANS - Laminated glass

Which of the following is considered to be the most resistant to a blast explosion?

ANS - Thick reinforced concrete walls

The weakest area in a window is usually:

ANS - The sash

Which of the following is not true regarding the use of security doors as barriers?


a. Locking hardware is an important aspect of door security.


b. The doorframe may be a weak point if not properly installed.


c. Door hinges may add to the weakness of a door if not properly installed.


d. The door is usually stronger than the surface into which it is set.

ANS - d. The door is usually stronger than the surface into which it is set.

Which one of the following is true regarding structural barriers?


a. Structural barriers serve as psychological deterrents.


b. The objective of barriers is to cause as much delay as possible .


c. A series of barriers is usually used in any effective physical protection plan.


d. A series of concentric barriers should separate the area to be protected.


e. Even with good planning, most structural barriers do not pre- vent penetration by humans.


f. All of the above.

ANS - f. All of the above.

A system using inaudible sound waves to detect the presence of an intruder or other disturbance is known as a(n):

ANS - Ultrasonic motion detection system

system whereby the alarm signal is heard only in the immediate vicinity of the protected area is known as a:

ANS - Local alarm system

The control of traffic through entrances and exits of a protected area is referred to as:

ANS - Access control

The roof of a vault should be at least:

ANS- 6 in. thick

The interior height of a vault should not exceed:

ANS - 12 ft.

The maximum safe period of fire-resistant vaults is:

ANS - 6 h

Electronic data and material can begin to deteriorate at:

ANS - 150°F

The temperature that paper may be destroyed at is:

ANS - 350°F

Which of the following methods of attacking newer-model safes is considered to be impractical? a. Peel


b. Punch


c. Burn


d. Manipulation


e. Explosion

ANS - d. Manipulation

Fire-resistant safes must pass which of the following tests?


a. Explosion


b. Impact


c. Fire exposure


d. All of the above

ANS - d. All of the above

Vaults are designed to meet most fire protection standards that are specified by the:

ANS - National Fire Protection Association

The UL symbol “TRTL” indicates:

ANS - That the safe is resistant to both torches and tools

Which of the following is not correct with regard to safes?


a. Money safes do not have accredited fire resistance.


b. UL classification labels are removed from all safes exposed to fires.


c. Record safes are designed to resist fires only.


d. Quality equipment should be purchased only from reputable dealers.


e.Insulation in record safes more than 30 years old may negate fire-resistant qualities.


f.None of the above.

ANS - f.None of the above.

A 50% insurance discount is generally allowed to protect a safe if:

ANS - The premises are open 24 h/day

The weakness of the burning bar as a burglary tool is that:

ANS - It produces a large volume of smoke

Which of the following methods has not been used in recent years to crack open record and money safes?


a. Punching


b. Core drilling


c. Using a fluoroscope


d. Torching


e. Using a laser beam

ANS- e. Using a laser beam

An experienced safecracker will ordinarily use which of the fol-lowing methods?


a. Trying the maintenance standard combination


b. Trying the day combination


c. Trying the handle


d. All of the above

ANS - d. All of the above

Most theft is committed by:

ANS - Amateurs

Security vaults differ from safes in that:

ANS - They are permanently affixed to the building

Money safes are classified by both Underwriters Laboratories and:

ANS - The Insurance Services Office

A relock” on a vault door will automatically prevent the bolt mechanism from operating when:

ANS- There is an attack on the door or the combination lock

Which of the following is not generally true regarding money safes?


a. Those manufactured prior to 1960 have round doors.


b. They provide good protection against fire.


c. They always have wheels.


d. Today, money safes have square doors.


e. Both b and c.


f. All of the above.

ANS- e. Both b and c.

Safes that are UL classified must be anchored to the floor or must weigh at least:

ANS - 750 lb

Which of the following would be a UL computer media storage classification?

ANS- 150-4

The acceptable vault construction of insulated doors has a minimum reinforced concrete wall, floor, and ceiling of:

ANS - 6ft

Underwriters Laboratories does independent testing on security containers that simulate a major fire where the heat builds up gradually to:

ANS- 2000°F

Which of the following is not an approved UL safe classification?


a. 350-1


b. 350-2


c. 350-3


d. 350-4

ANS- c. 350-3

In meeting minimal federal specifications, government security containers must be equipped with a combination lock capable of resisting manipulation and radiological attack for:

ANS- 20 man-hours

In meeting minimal federal specifications, noninsulated security containers must satisfactorily pass a drop test of:

ANS- 30ft

In meeting federal specifications, insulated units must have the following fire-resistant minimum ratings:

ANS- Class 350: 1 h

Which of the following is more of a probable disadvantage in the use of sentry dogs?


a. A dog is more effective than a human during inclement weather.


b. A dog has a keen sense of smell.


c. A dog provides a strong psychological deterrent.


d. The type of dog best suited for security work is naturally dangerous.


e. A dog can detect and apprehend intruders.

ANS- d. The type of dog best suited for security work is naturally dangerous.

A sentry dog normally does not perform as well at:


a. Radar sites


b. Warehouses


c. Gasoline storage areas


d. Ammunition storage areas


e. Offices containing classified materials

ANS- c. Gasoline storage areas

An inventory of key systems should be conducted at least

ANS- Annually

Which of the following is not true with regard to door latches?


a. A dead-bolt latch is easy to install and can be used on almost any door.


b. Chain latches are highly recommended as effective security measures.


c. A dead-bolt latch is very expensive.


d. A dead-bolt latch increases the security posture of the facility.


e. Both b and c.


f. Both a and d.

ANS- e. Both b and c

Which lock is generally used on automobiles, desks, and cabinets?

ANS- wafer

The number of combinations possible with a lock that has 40 numbers and a 3-number combination is?

ANS- 64,000

Of the following locks, which type is generally considered to have the poorest security value? a. An interchangeable core system


b. Conventional combination locks


c. Key locks


d. Manipulation-resistant combination locks

ANS- c. Key locks

Which of the following is not true with regard to lock-and-key systems?


a. The locking system should be supplemented with other security devices.


b. Most key locks can be picked by an expert in a few minutes.


c. A high-quality pickproof lock is considered a positive bar to entry.


d. The lock is the most accepted and widely used security device of the basic safeguards in protecting installations.


e. Locks, regardless of quality or cost, should be considered as delay devices only.

ANS- c. A high-quality pickproof lock is considered a positive bar to entry.

The principle of the pin-tumbler lock can be traced back histori- cally to:

ANS- Egyptians more than 4000 years ago

An alarm system whereby the central station is owned by and located within the installation being protected is known as a(n):

ANS- Proprietary system

An alarm system that is monitored by an outside company to provide electric protective services in which they provide the appropriate actions is known as a(n):

ANS- Central station system

An alarm system in which the installation-owned system is a direct extension of the police or fire alarm system is known as a(n):

ANS- Auxiliary system

The intrusion detection system that is used on safes, walls, and openings in an effort to establish an electrostatic field around an object to be protected is known as a(n)

ANS- Capacitance detection system

The intrusion detection system in which a pattern of radio waves is transmitted and partially reflected back to the antenna is known as a(n):

ANS- Microwave detection system

What agency should be consulted before installing protective lighting adjacent to navigable waters?

ANS- The US Coast Guard

The US Army illumination intensity minimums for lighting the perimeter of a restricted area is:

ANS- 0.40 foot-candle

Water approaches that extend to 100 ft. from the pier should be illuminated to at least:

ANS- 0.5 foot-candle

What is the most common protective lighting system, which consists of a series of fixed luminaries arranged to flood a given area during the hours of darkness with overlapping cones of light?

ANS- Continuous lighting

Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:

ANS- 1.0 foot-candle

Lighting units of four general types are used for protective lighting. Which of the following is not used?


a. Emergency


b. Movable


c. Standby


d. Intermittent


e. Continuous

ANS- d. Intermittent

Which of the following principles of protective lighting is not correct?


a. Lighting should be used with other measures, such as fixed security posts, fences, etc., and not used alone.


b. A large amount of light should be focused on security patrol routes.


c. Adequate, even light should be used on bordering areas.


d. There should be a high brightness contrast between an intruder and the background.


e. Glaring lights should be directed at the eyes of an intruder.

ANS- b. A large amount of light should be focused on security patrol routes.

Measured horizontally 6 in. above ground level and at least 30 ft. outside the exclusion area to barrier, the perimeter band of lighting must provide a minimum intensity of:

ANS- 0.2 foot-candle

Q .Which of the following characteristics of protective lighting is incorrect?


a. It may be unnecessary where the perimeter fence is protected by a central alarm system.


b. It usually requires less intensity than working light.


c. It may also provide personal protection by reducing advantages of concealment.


d. It should only be used as a psychological deterrent.


e. Such lighting is expensive to maintain.

ANS- e. Such lighting is expensive to maintain.

Manhole covers ― in. or more in diameter should be secured to prevent unauthorized openings.

ANS- 10

As a general rule, between the perimeter barrier and structures within the protected area, except when a building is a part of the perimeter barrier, there should be a clear zone of at least:

ANS- 50ft

Between the perimeter barrier and exterior structures should be a clear zone covering:

ANS- 20ft

Unavoidable drainage ditches, culverts, vents, ducts, and other openings should be protected by securely fastened welded-bar grills when they have a cross-sectional area greater than:

ANS- 96 in.2

How many inches apart should strands of barbed wire or tape used as a top guard on a fence be spaced?

ANS- 6

A top guard must consist of:

ANS- Three strands of barbed wire or tape

Top-guard supporting arms should be permanently affixed to the top of the fence posts to increase the overall height of the fence by at least:

ANS- 1 ft

The distance between barbed strands in a barbed-wire fence should not exceed:

ANS- 6 in.

A standard barbed-wire, twisted, double-strand fence has how many point barbs spaced an equal distance apart.

ANS- 4

The federal specification regarding standard barbed-wire fencing that is twisted and double-strand is that it should be:

ANS- 12 gauge

Excluding the top guard, standard barbed-wire fencing that is intended to prevent human trespassing should not be less than:

ANS- 7 ft. high

In a chain-link fence with mesh openings for general security purposes, the openings should be no larger than:

ANS- 2 in.

Excluding the top guard, a chain-link fence for general security purposes should be:

ANS- 9 gauge

What type of fencing is generally used for protection of limited and exclusion areas?

ANS- Chain link

A restricted area containing a security interest or other sensitive matter, in which uncontrolled movement can permit access to the security interest or sensitive matter but within which access may be prevented by security escort and other internal restrictions and controls, is called a(n)

ANS- Limited area

Which of the following is not a known advantage of the establishment of restricted areas?


a. They provide an increase in security without slowdown in operation.


b. They provide increased security through buffer zones.


c. They allow for varying degrees of security as required.


d. They improve overall security.


e. They make it possible to have security compatible with operational requirements.

ANS- a. They provide an increase in security without slowdown in operation.

The designation and establishment of “restricted areas” according to army regulations is performed by the:

ANS- Military commander of the installation or facility

The practice of having at least two authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed, present during any operation that affords access to a sensitive area is referred to as the:

ANS- Two-man rule

The use of a simple code word or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is termed:

ANS- Duress code

Which of the following is not true in regard to establishing and identifying personnel to control movement?


a. The identification card should be designed as simply as possible.


b. Detailed instructions should be disseminated as to where,when, and how badges should be worn.


c. Procedures should be designed to show employees what to do when an identification card or badge is lost.


d. The identification card or badge should be designed in a relatively complicated manner to avoid duplication.


e. Prerequisites for reissue should be devised and disseminated.

ANS- d. The identification card or badge should be designed in a relatively complicated manner to avoid duplication.

The most vulnerable link in any identification system is:

ANS- Perfunctory performance of duty

Which of the following is not correct regarding a security education program?


a. Many people are naive and trusting.


b. All installation personnel must be made aware of the constant threat of breaches of security.


c. Structural aids to security are valueless without active support of all personnel.


d. Security consciousness is an inherent state of mind.

ANS- d. Security consciousness is an inherent state of mind.

From a security perspective, what is the first factor to be considered in facility construction?

ANS- The building site itself

What is a key consideration in a risk analysis or risk assessment process?


a. Vulnerability to attack


b. Probability of attack


c. Cost


d. Impact to the business if loss occurs


e. Both a and b


f. All of the above

ANS- f. All of the above

A critical on-site examination and analysis of a facility to ascertain the present security status and to identify deficiencies or excesses in determining the protection needed to make recommendations to improve overall security is the definition of a(n):

ANS- Security survey

The degree of protection desired in any installation is predicated on an analysis of which of the following?

ANS- Criticality and vulnerability

What process does a security manager use in establishing priori- ties in the protection of assets?

ANS- Security survey and Risk analysis or assessment

For persons in responsible and sensitive positions, financial and lifestyle reinvestigations should be conducted every:

ANS- 18 months

In which of the following situations in proprietary security are polygraphs most often used?


a.Periodic tests of all employees to establish their conduct if they are a necessity of the job due to government regulations


b. Specific questions to determine the causes of specific incidents


c. Preemployment examinations if required or approved by law


e. All of the above

ANS- e. All of the above

Q. An exit interview is a valuable tool for which of the following reasons?


a. It gives the employee an opportunity to list grievances


b. Management often learns of problems not previously known.


c. It helps to reduce loss when a checklist is used to have company property returned.


d. It is used to remind departing employees of a legal obligation to protect trade secrets or confidential records.


e. All of the above

ANS- e. All of the above

The polygraph measures the following stress indicators except:


a. Quickened pulse


b. Raised blood pressure


c. Rate of speech


d. Shallow respiration


e. Lowered galvanic skin resistance

ANS- c. Rate of speech

Preemployment polygraph tests are limited to which of the following?


a. National defense positions


b. Law enforcement positions


c. Positions with banks, savings, loans, or armored transportation


d. Federal positions involving law enforcement, national defense, and other relevant positions of trust


e. All of the above

ANS- e. All of the above

Which of the following is permitted by an employer in regard to the screening process?


a. Ask if the applicant is a US citizen.


b. Inquire about racial background.


c. Require a photo with the application.


d. Inquire regarding the applicant’s religion.


e. Ask questions about organizational affiliations whereby race, religion, or national origin data can be obtained.

ANS- a. Ask if the applicant is a US citizen.

A complete background investigation usually covers which of the following steps?


a. A personal history statement (PHS)


b. Evaluation of the PHS


c. A national agency check


d. A full field investigation


e. All of the above

ANS- e. All of the above

Which of the following is not permitted by an employer in regard to the screening process?


a. Ask if the applicant is a US citizen.


b. Have the applicant write his or her name and address on the application form.


c. Require a photo with the application.


d. Explain duty hours required in job.


e. Inquire about educational and training background.

ANS- c. Require a photo with the application.

Personnel investigations usually involve which of the following techniques?


a. Backgrounding


b. Positive vetting


c. Polygraphing


d. Profiling


e. All of the above

ANS- e. All of the above

The persons who find integrity tests offensive are:

ANS- Twice as likely to admit to criminal or drug abuse behavior

Which of the following is not true with regard to a résumé?


a. It does not provide the information that the company requires.


b. It is never accepted in lieu of a completed application form.


c. It is always accepted and is reviewed as part of the investigation.


d. It is an acceptable form of information for a professionalposition.

ANS- d. It is an acceptable form of information for a professionalposition.

Any investigation that includes unfavorable information or results in an adverse employment decision should be:

ANS- Retained in file for a minimum of 3 years

The frequency of a reinvestigation of the “financial lifestyle” inquiry should generally be:

ANS- Every 18 months

When conducting an interview during a background investigation, the investigator should advise the party being interviewed that the applicant/employee is:

ANS- Being investigated in connection with a position of trust

Under federal law, the use of the polygraph for preemployment is permissible, except in which industry?

ANS- Alcohol manufacturing

When interviewing an applicant for employment, the interviewer may ask which questions:


a. Have you ever been arrested?


b. How old are you?


c. Are you married?


d. Can you meet the attendance requirements of this job?

ANS- d.Can you meet the attendance requirements of this job?

Which is not a strategy for managing violence in the workplace?


a. Establish a committee to plan violence prevention.


b. Consider OSHA guidelines to curb workplace violence.


c. Have professionally trained and armed security officers.


d. Establish policies and procedures and communicate the problems of threats and violence to all employees.

ANS- c. Have professionally trained and armed security officers.

Which of the following laws would not serve as a legal guide in the hiring of personnel?


a. Civil Rights Act


b. Age Discrimination in Employment Act


c. Lanham Act


d. Americans with Disabilities Act

ANS- c. Lanham Act

An important task that faces every organization is the hiring of personnel. The purpose of applicant screening is:

ANS- To identify the most appropriate person

The concept that an individual should be aware of the security program and persuaded that the program is relevant to his or her own behavior is known as:

ANS- Security awareness

Of all security processes, the most critical is:

ANS- Personnel

A major concern of a company, above all else, should be:

ANS- The care and well-being of its employees

Employees’ attitudes are directly affected by:

ANS- Personal problems that originate within and outside the company

Employees, for the most part, are:

ANS- Conscientious, honest individuals who have the company’s best interests at heart

Personnel security problems are caused by:


a. Dishonesty


b. Disloyalty


c. Disinterest of employees


d. Low morale


f. All of the above

ANS- f. All of the above

One thousand shopping tests across the nation showed that in a 10-year period, cash register thefts had increased by what percentage?

ANS- 86

In the United States, employee thefts are:

ANS- Greater than the problem of crime in the streets

The first skill the manager or supervisor must learn is:

ANS- The ability to listen

Nondirectional counseling of upset employees:

ANS- Involves primarily being a good listener

Directional counseling of upset employees:

ANS- Is not usually desirable

Employee complaints often arise from:

ANS- A form of substitution for expressing their fears and frustrations concerning their personal lives

The most effective deterrent to shoplifting is:

ANS- Well-trained personnel

Overrings should not be corrected by undercharging on other items because this:

ANS- Is probably the easiest method of theft by employees

Which of the following should the manager or supervisor immediately approve by signature:

ANS- All voids and overrings over a certain amount

Stores that rely on stapling packages shut with the register tape folded over the top of the bag do this:

ANS- On the assumption that employees will not help each other

An impelling type of leadership tends to reduce employee dishon- esty because:

ANS- It reduces employee frustration

Frustration and aggression may be caused by:

ANS- The supervisor’s lack of consideration in dealing with his or her employees or by unrealistic company policies

An employee should be questioned:

ANS- Behind a closed door

Many experts agree that the most important deterrent to internal theft is:

ANS- Fear of discovery

A psychopath can often pass a polygraph test with a clean record because of the following characteristic:

ANS- An abnormal lack of fear

Individuals who find integrity tests offensive are:

ANS- Twice as likely to admit to criminal activity or drug abuse

Of those acquitted or dismissed by the courts for theft, over _________% were rearrested within 30 months.

ANS- 80

The theft triangle consists of the following components:

ANS- Motivation, opportunity, and rationalization (desire)

Scientists at Yale University (1939) concluded that frustration almost always results in some aggressive reaction, the most important point being:

ANS- A substitute satisfaction, in which the employee “gets even” by stealing from the company

A study by scientists at Yale University (1939) found that theft resulted from?

ANS- Aggression, frustration, and low anticipation of being caught

An employer may not question an applicant about:

ANS- An arrest for a crime against property

An employer may reject an applicant on the basis of:

ANS- A conviction for a crime against property

The single most important safeguard for preventing internal theft is probably:

ANS- Upgrading the screening of new employees

Store inventory shortages are mainly caused by:

ANS- Shoplifting losses


-Employee theft


-Paperwork errors

According to estimates, about one-third of all business failures are caused by:

ANS- Theft from employees

Dishonest employees cost employers __________ as much as all the nations’ burglaries, car thefts, and bank holdups combined.

ANS- Twice

Which of the following should not be a policy in considering applicants for hire?


a. Similar problems in numerous areas, such as bad credit, absenteeism, and numerous short-term jobs.


b. A problem in one area of interest should be enough to disqualify an applicant for hire.


c. If obviously overqualified, find out why applicant is willing to accept the current job.

ANS- b. A problem in one area of interest should be enough to disqualify an applicant for hire.

Which of the following may be a clue on the employment form for considering refusal to hire?


a. Gaps in employment history


b. Long list of jobs over a relatively short period


c. A significant reduction in salary at a recent job


d. 3 to 6 months spent in the military


e. All of the above

ANS- e. All of the above

Inquiring about an applicant’s age and date of birth on a preem- ployment form may be prohibited by:

ANS- The Age Discrimination in Employment Act

Of the following questions, what cannot be asked of an applicant because of federal laws?


a. Whether an applicant is married, divorced, separated, widowed, or single


b. Whether an applicant owns or rents a residence


c. Whether an applicant has ever been arrested


d. Whether an applicant’s wages have ever been garnished


e. All of the above

A- e. All of the above

The basic principle of personnel security is:

ANS- That attitudes and honesty of rank-and-file employees are key

A Burns security survey covering 847 banks found that the most important single step toward improved crime prevention was:

ANS- Training of bank employees

The quality of service rendered by security personnel is deter-mined by which of the following?


a. Personnel selection process


b. Training


c. Wages


d. Supervision


e. All of the above

ANS- e. All of the above

Which of the following is not a requirement for handling preem- ployment interviews?


a. Interviews must be voluntary.


b. Interviews must be unbiased.


c. For an interview to be effective, it should be conducted with a witness or a friend of the applicant present.


d. The interviewer should not give out information.


e. Complete and accurate notes should be taken.

ANS- c. For an interview to be effective, it should be conducted with a witness or a friend of the applicant present.

Background investigations of an applicant should:


a. Be based on the application and an interview record form


b. Be done by a carefully screened investigator


c. Be conducted without any prior contact from the applicant by the investigator


d. All of the above

ANS- d. All of the above

What are the advantages of having an outside organization perform background screening on your employees?


a. Company personnel are spared potential embarrassments as well as liability claims.


b. Depending on the number of checks, the costs will be lower.


c. Screening will be done by trained staff with extensive sources of information.


d. Screenings will be unbiased with no corrupt motivation.


e. All of the above.

ANS- e. All of the above.

According to a 1979 survey by the American Society for Industrial Security, the number of organizations in the United States offering security courses is greater than:

ANS- 180

The main hurdle to overcome for personality tests is the requirement of the Civil Rights Act of 1964 that such a test not be discriminatory against protected minorities. This rule used as a test is known as the:

ANS- 80% rule

A personality test that uses the MMPI evaluation and states that it is specially designed for police and security applicants is:

ANS- The Caldwell Report

An example of an honesty test given by firms to determine dishonest employees is:

ANS- The Reid survey

Which of the following is not an example of an intelligence test?


a. Manual placement test


b. Stanford-Binet IQ test


c. Armed Forces General Classification Test


d. Henman-Nelson IQ test

ANS- a. Manual placement test

Security awareness is motivated by what technique?


a. Integration into line operations


b. Formal security briefings


c. Use of written material


d. All of the above

ANS- d. All of the above

The theory that the human organism is motivated by an ascending series of needs and that once the lower needs have been satisfied, they will be supplanted by the higher needs as motives for behavior is known as:

ANS- Maslow’s “hierarchy of prepotency”

The attitude or state of mind through which individuals are conscious of the existence of the security program and are persuaded that it is relevant to their own behavior is a concept known as:

ANS- Security awareness

The most critical component of all security processes is:

ANS- Personnel

A comprehensive personnel security program should include:


a. Adequate job specifications and performance standards


b. Truth verification standards


c. Appropriate selection and recruitment criteria


e. All of the above

ANS- e. All of the above

The standard of employment of military and government person- nel was established by which executive order?

ANS- 1045

The real meaning of the governmental policy in personnel secu- rity is:

ANS- keep those considered to be “risky” from obtaining jobs

When an individual is eligible to have access to classified information, this is called:

ANS- A security clearance

Which of the following security clearances is not used by the government?


a. Top secret


b. Secret


c. Confidential


d. Restricted


e. Q clearance

ANS- d. Restricted

What agency is responsible for processing requests for security clearances?

ANS- The Department of Defense

Individuals who are not US citizens, or are immigrants, are not eligible for security clearances except under reciprocal clearance involving:

ANS- Canada and the United Kingdom

Which is a type of personnel security investigation?

ANS- National Agency Check &


Background investigation

An investigation that consists of checking the records of appropriate federal agencies for information bearing on the loyalty and suitability of a person under investigation is known as a(n):

ANS- National Agency Check

A background investigation for a security clearance consists of: a. Checking college attendance, if attended


b. Verifying service in the armed forces


c. Interviewing character references


e. All of the above

ANS- e. All of the above

During a security clearance background investigation, verification of naturalization will primarily be done by:

ANS- Checking records of appropriate US district courts

The Act passed to require that consumer reporting agencies adopt reasonable procedures for meeting the needs of commerce for consumer credit is commonly known as:

ANS- The Fair Credit Reporting Act

During a security clearance background investigation, when travel outside the United States is detected, which of the following should be checked?


a. FBI records


b. CIA records


c. Immigration records


d. Customs records


f. None of the above

ANS- f. None of the above