Join the discussion
Question 1/92
Who shall establish, document, provide resources, and demonstrate commitment to a business continuity management policy within the defined scope of the business continuity management system?
Correct Answer: D
Add Comments
- Other Question (92q)
- Q1. Who shall establish, document, provide resources, and demonstrate commitment to a business...
- Q2. When planning physical protection measures for documents, it is important to know that pap...
- Q3. The term that best describes the ultimate goal of a supervisor's job is:...
- Q4. Which method of wiretapping does not require a physical connection to a line?...
- Q5. With special provisions and approvals from the authority having jurisdiction, it is accept...
- Q6. A fidelity bond is a type of insurance that will compensate for company losses from:...
- Q7. In a theft of proprietary information case, which of the following steps is most important...
- Q8. While conducting an executive protection risk assessment, the executive protection special...
- Q9. Which of the following provides the basis in a contract to evaluate return on investment?...
- Q10. When collecting a cartridge case as evidence, the recommended method of handling is to:...
- Q11. When handling bullets as evidence, it is most important to avoid:...
- Q12. Which of the following tools can greatly enhance the security of wireless communications?...
- Q13. During an emergency evacuation of a facility, special provisions must be made for:...
- Q14. When designing a solution for a facility or upgrading existing components, the design and ...
- Q15. Whenever possible, security planning for a new facility should begin during which of the f...
- Q16. While conducting an interview, the most important initial objective for the investigator t...
- Q17. The two basic bomb classifications are:
- Q18. A major advantage of outsourcing investigative services is the ability to:...
- Q19. The trend for the future in private security is toward:...
- Q20. If an employer does not utilize testing for drug impairment it should:...
- Q21. There is ample evidence that private policing can deliver more efficient services at a low...
- Q22. A correct statement about technical security countermeasures (TSCM) is that they:...
- Q23. A business impact analysis provides management information on:...
- Q24. Which of the following is the basis for all effective security activity?...
- Q25. For large commercial and industrial enterprises, the need to resume normal operations as q...
- Q26. Which of the following locks generally has the greatest delay factor?...
- Q27. Which security program emphasizes a continuing attitude that can move an individual to tak...
- Q28. Which of the following executive protection goals is the top priority?...
- Q29. In a joint-task-force environment, it is particularly important for lead investigators to:...
- Q30. Losses avoided may be determined by:
- Q31. In large-scale emergencies, the Incident Command System can be effectively deployed by:...
- Q32. An affiliation of organizations agreeing to assist each other during an emergency by provi...
- Q33. When a disciplinary action commences, supervisors should:...
- Q34. The three types of line transmissions in electronic protection systems are:...
- Q35. Applicant falsifications generally fall into two categories, misrepresentation and:...
- Q36. Protection-in-depth is the strategy of:
- Q37. Which is most true of corporate misconduct such as workplace violence, substance abuse, an...
- Q38. In order to perform a logical risk analysis, it is first necessary to identify the assets ...
- Q39. In developing a proprietary security organization, it is necessary to first:...
- Q40. To maintain effective liaison relationships, an investigator must avoid:...
- Q41. Which method of wiretapping does not require a physical connection to a line?...
- Q42. Post orders should be developed with which of the following criteria in mind?...
- Q43. A property right granted to an inventor to exclude others from making, using, offering for...
- Q44. To conduct the job analysis, it is necessary to define the positions within the security d...
- Q45. After a risk analysis is completed, it is determined that information assets are not adequ...
- Q46. An organization's long-term ambition is called its:...
- Q47. Which of the following represents the four steps that are recommended after an information...
- Q48. Alcohol-abuse symptoms are similar to symptoms associated with the abuse of:...
- Q49. Risk acceptance is an informed decision to take a particular risk and:...
- Q50. Which of the following would be most helpful in selling security to management?...
- Q51. Which type of sensor creates an electrical field around metallic objects that signals an a...
- Q52. The two key elements in any contingency plan are:...
- Q53. An indication of deception by a suspect during the interviewing process would be:...
- Q54. Which of the following types of intrusion detection systems is commonly used to protect sa...
- Q55. Which of the following is a major problem associated with drug use in the workplace?...
- Q56. Which type of motion detection sensor can penetrate unshielded walls and respond to motion...
- Q57. Establishing an in-house guard service requires:...
- Q58. A security professional is designing a CCTV system to monitor activity in an employee park...
- Q59. The most important function of executive protection is:...
- Q60. Knowing where security fits into a company's budget is critical to the manager successfull...
- Q61. In the event of an earthquake, all of the following are recommended EXCEPT...
- Q62. An erroneous test result that indicates the presence of a drug that is absent is known as ...
- Q63. Evolving trends within the security profession fall into the areas of:...
- Q64. An effective as set-protection scheme comprising a series of well-planned and complementar...
- Q65. Which of the following can be used to authenticate and authorize computer access?...
- Q66. Which test determines whether a procedure, lock, or electronics system will do what it was...
- Q67. Performing a vulnerability analysis, selecting and installing countermeasures, and testing...
- Q68. Having received a bomb threat from a non-credible source, the security manager should imme...
- Q69. An examination of workplace violence incidents not involving robbery reveals that perpetra...
- Q70. Which of the following surveys should be conducted to determine the effectiveness of risk ...
- Q71. When companies are downsizing their staffs. increasing a manager's span of control is ofte...
- Q72. The criterion that serves as the basis for rating fire-resistant document containers expos...
- Q73. According to the motivation-hygiene theory, employee motivation depends on:...
- Q74. To motivate employees, supervisors should:
- Q75. Which of the following systems will improve the accuracy of security incident reporting an...
- Q76. Which of the following is one step in the risk assessment process for use in protecting in...
- Q77. Capacitance alarm systems are sometimes referred to as:...
- Q78. Which type of risk countermeasure is generally the least expensive?...
- Q79. To determine a return on an investment, it would be best to use which of the following?...
- Q80. What two areas are the most likely forms of dishonesty a security professional will most l...
- Q81. What are the three points of the theft triangle?...
- Q82. For a company that operates at a net profit of 5%. the amount of additional sales required...
- Q83. What is the most important reason why an organization should implement a formal workplace ...
- Q84. A planned and organized determination of facts concerning specific events, occurrences, or...
- Q85. Which of the following types of ethics is the most relevant to business?...
- Q86. Which of the following guidelines should organizations adopt when conducting preemployment...
- Q87. Tax laws, trade agreements, and product safety labeling are examples of what business macr...
- Q88. A security organization that utilizes a departmental structure may limit opportunities for...
- Q89. A newly hired corporate investigator is conducting interviews to collect information and d...
- Q90. Choosing a security container for a specific software application is largely determined by...
- Q91. Opium, morphine, and codeine are all classified as:...
- Q92. A major objective of a business impact analysis is to:...
