TCO 1) Which of the following are types of comparative negligence statutes?
TCO 1) Which of the following are types of comparative negligence statutes?Pure approachThe 50/50
rule
The 51% rule
Pure approach, the 50/50 rule, and the 51% rule
Flag this Question
Question 25 pts
(TCO 2) Which type of risk management involves buying insurance?
Risk avoidance
Risk reduction
Risk spreading
Risk transfer
Flag this Question
Question 35 pts
(TCO 3) The security survey must be comprehensive, and it should identify _____.
property, information, and money to be protected
fences, alarm systems, and guard posts that are no longer effective
anything (or anyone) that could adversely threaten the well-being of the assets
people who are coming onto the organization’s property
Flag this Question
Question 45 pts
(TCO 4) Under normal circumstances, most organizations use
high-tech, state-of-the-art security systems.
minimal security measures.
fences and security guards.
electronic alarm systems.
Flag this Question
Question 55 pts
(TCO 5) Which of the following is not a biometric access control system?
Fingerprint recognition
Voice recognition
Hand geometry recognition
Wiegand effect recognition
Flag this Question
Question 65 pts
(TCO 6) The concept of separation of responsibility is a(n) _____.
auditing control
procedural control
physical control
continuing control
Flag this Question
Question 75 pts
(TCO 7) According to the text, which of the following is not an acceptable form of identification for cashing checks?
Driver’s licenses
Social Security cards
Passports
Motor vehicle registrations
Flag this Question
Question 85 pts
(TCO 8) A program that takes over computer memory and denies its use to legitimate programs is called what?
Trojan horse
Bombs
Viruses
Worms
Flag this Question
Question 95 pts
(TCO 9) Trends for security managers to consider when developing anti-terrorism security programs include
terrorists’ increasing targeting of soft targets.
the increasing lethal aspect of attacks.
the increasing blurring between terrorism and domestic threats
All of these should be considered.
Flag this Question
Question 105 pts
(TCO 1) The purposeful infection of livestock with disease is an example of
confinement security.
feedlot security.
agroterrorism.
agrosecurity.
Flag this Question
Question 115 pts
(TCOs 4 and 5) Which of the following is not a consideration when determining the need for an alarm system?
Accessibility of the facility to intruders
Sensitivity of information and value of property to be protected
Types of other measures in place
All of these considerations are appropriate.
Flag this Question
Question 125 pts
(TCO 2) Walls, ceilings, and floors surrounding a vault should be
at least 6 inches thick.
at least 12 inches thick, and twice as thick as the vault door.
equipped with power outlets.
never more than 22 inches thick.
Flag this Question
Question 135 pts
(TCO 3) Loss of marketplace advantage is a factor for consideration in determining _____.
Probability
Temporary replacement
Criticality
Spatial relationship
Flag this Question
Question 145 pts
(TCO 7) The four broad categories of workplace violence are
threat, harassment, attack, and sabotage.
threat, harassment, violence, and sabotage.
harassment, violence, sabotage, and intimidation.
intimidation, harassment, sabotage, and attack.
Flag this Question
Question 155 pts
(TCO 9) What are the three forms of piracy?
Bootlegging, pirating, duplication
Bootlegging, counterfeiting, copyright infringement
Counterfeiting, recording fraud, bootlegging
Counterfeiting, pirating, bootlegging
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"
