The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 352 Weeks Ago, 4 Days Ago |
| Questions Answered: | 20103 |
| Tutorials Posted: | 20155 |
MBA, PHD
Phoniex
Jul-2007 - Jun-2012
Corportae Manager
ChevronTexaco Corporation
Feb-2009 - Nov-2016
(TCO 1) Which of the following are types of comparative negligence statutes?
Pure approach
The 50/50 rule
The 51% rule
Pure approach, the 50/50 rule, and the 51% rule
Flag this Question
Question 25Â pts
(TCO 2) Which type of risk management involves buying insurance?
Risk avoidance
Risk reduction
Risk spreading
Risk transfer
Flag this Question
Question 35Â pts
(TCO 3) The security survey must be comprehensive, and it should identify _____.
property, information, and money to be protected
fences, alarm systems, and guard posts that are no longer effective
anything (or anyone) that could adversely threaten the well-being of the assets
people who are coming onto the organization's property
Flag this Question
Question 45Â pts
(TCO 4) Under normal circumstances, most organizations use
high-tech, state-of-the-art security systems.
minimal security measures.
fences and security guards.
electronic alarm systems.
Flag this Question
Question 55Â pts
(TCO 5) Which of the following is not a biometric access control system?
Fingerprint recognition
Voice recognition
Hand geometry recognition
Wiegand effect recognitionÂ
Flag this Question
Question 65Â pts
(TCO 6) The concept of separation of responsibility is a(n) _____.
auditing control
procedural control
physical control
continuing control
Flag this Question
Question 75Â pts
(TCO 7) According to the text, which of the following is not an acceptable form of identification for cashing checks?
Driver's licenses
Social Security cards
Passports
Motor vehicle registrations
Flag this Question
Question 85Â pts
(TCO 8) A program that takes over computer memory and denies its use to legitimate programs is called what?
Trojan horse
Bombs
Viruses
Worms
Flag this Question
Question 95Â pts
(TCO 9) Trends for security managers to consider when developing anti-terrorism security programs include
terrorists' increasing targeting of soft targets.
the increasing lethal aspect of attacks.
the increasing blurring between terrorism and domestic threats
All of these should be considered.Â
Flag this Question
Question 105Â pts
(TCO 1) The purposeful infection of livestock with disease is an example of
confinement security.
feedlot security.
agroterrorism.
agrosecurity.
Flag this Question
Question 115Â pts
(TCOs 4 and 5) Which of the following is not a consideration when determining the need for an alarm system?
Accessibility of the facility to intruders
Sensitivity of information and value of property to be protected
Types of other measures in place
All of these considerations are appropriate.Â
Flag this Question
Question 125Â pts
(TCO 2) Walls, ceilings, and floors surrounding a vault should be
at least 6 inches thick.
at least 12 inches thick, and twice as thick as the vault door.
equipped with power outlets.
never more than 22 inches thick.Â
Flag this Question
Question 135Â pts
(TCO 3) Loss of marketplace advantage is a factor for consideration in determining _____.
Probability
Temporary replacement
Criticality
Spatial relationship
Flag this Question
Question 145Â pts
(TCO 7) The four broad categories of workplace violence are
threat, harassment, attack, and sabotage.
threat, harassment, violence, and sabotage.
harassment, violence, sabotage, and intimidation.
intimidation, harassment, sabotage, and attack.
Flag this Question
Question 155Â pts
(TCO 9) What are the three forms of piracy?
Bootlegging, pirating, duplication
Bootlegging, counterfeiting, copyright infringement
Counterfeiting, recording fraud, bootlegging
Counterfeiting, pirating, bootleggingÂ
Hel-----------lo -----------Sir-----------/Ma-----------dam----------- T-----------han-----------k Y-----------ou -----------for----------- us-----------ing----------- ou-----------r w-----------ebs-----------ite----------- an-----------d a-----------cqu-----------isi-----------tio-----------n o-----------f m-----------y p-----------ost-----------ed -----------sol-----------uti-----------on.----------- Pl-----------eas-----------e p-----------ing----------- me----------- on----------- ch-----------at -----------I a-----------m o-----------nli-----------ne -----------or -----------inb-----------ox -----------me -----------a m-----------ess-----------age----------- I -----------wil-----------l