Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | Apr 2017 |
Last Sign in: | 3 Weeks Ago, 6 Days Ago |
Questions Answered: | 7559 |
Tutorials Posted: | 7341 |
BS,MBA, PHD
Adelphi University/Devry
Apr-2000 - Mar-2005
HOD ,Professor
Adelphi University
Sep-2007 - Apr-2017
Question 1
5 / 5 pts
(TCO 2) Security surveys are primarily intended to _____.
 Â
provide physical security of facilities
 Â
assist in helping managers with security
 Â
allow for budget dollars in the security department
Correct!
 Â
identify an organization's security vulnerabilities and provide recommendations
See Chapter 8, page 150.
Â
Question 2
5 / 5 pts
(TCO 6) Which of the following is not an internal theft procedural control?
 Â
Auditing assets
 Â
Separation of responsibility
 Â
Access to records
Correct!
 Â
Noncompetitive bids
See Chapter 13, page 311.
Â
Question 3
5 / 5 pts
(TCO 7) Reference checking
 Â
is illegal.
 Â
is ineffective.
Correct!
 Â
is covered by federal regulations.
 Â
All of the aboveÂ
Â
See Chapter 13, page 296.
Â
Question 4
5 / 5 pts
(TCO 8) Built-in unintentional access to software code is referred to as a what?
Correct!
 Â
Backdoor
 Â
Front door
 Â
Trapdoor
 Â
WormÂ
Â
See Chapter 18, page 439.
Â
Question 5
5 / 5 pts
(TCO 9) The majority of robberies are carried out by how many people?
Correct!
 Â
One person
 Â
Two people
 Â
Three people
 Â
None of the above
See Chapter 19, page 465.
Â
Question 6
25 / 25 pts
(TCO 3) Discuss the reactive and proactive aspects of managing risks. Which is more common, and why?
Question 7
25 / 25 pts
(TCO 7) Identify at least 10 methods of theft that employees have used.
Question 8
25 / 25 pts
(TCO 9) Why are robbery prevention programs important?
Â
SEC----------- 31-----------0 W-----------eek----------- 6 -----------Qui-----------z-----------