Security Organ & Admin – Assignment Help | coursefighter.com

Security Organ & Admin – Assignment Help | coursefighter.com

Course Fighter  Information Systems Homework Help

Question 13 Points1. The logical set of tangible elements that protect selected assets from damage, compromise, and loss is called:The security systemPhysical securityAccess controlIntrusion detectionQuestion 23 PointsA security scheme that features several rings of protection that in the abstract look like a bull’s eye is called:Ring ProtectionAttenuated protectionConcentric protectionBull’s eye protectionQuestion 33 PointsThe usual starting point in assessing risk at a facility is the:Area in which assets are locatedFront doorSecurity guard forcePerimeterQuestion 43 PointsA river adjacent to a protected facility is called:Natural barrierAn access routeA vulnerabilityA man-made barrierQuestion 53 PointsThe protective capability of lighting is diminished:When cones of light overlap one anotherDuring winter monthsIn the absence of observation by a security officer forceWhen the lamp is fluorescentQuestion 63 PointsA well-designed and skillfully managed identification system willnotrequire the involvement of guards.TrueFalseQuestion 73 PointsA system that regulates movement into, within, and from a protected area or facility is called:An intrusion detection systemAn access control systemA security systemA restricted systemQuestion 83 PointsThe justification for inspecting vehicles leaving a nuclear power plant is based on the:Safety of the publicDollar value of removable items and materialsPhilosophy of managementCultural inclinations of the workforceQuestion 93 PointsFences, lights, sensors, and locks are:Not to be confused with walls, doors, and safesManufactured by one company when they are to be used for a security purposeSecurity standardsPhysical security safeguardsQuestion 103 PointsIt would be a mistake to depend on the technology of an electronic access control system:When the system was purchased from a non-U.S. manufacturerAfter the system has been operating more than one yearAnd the software that drives itAnd neglect the human side of the systemQuestion 113 Points. Business fraud usually takes the form of repetitive, incremental thefts.TrueFalseQuestion 123 PointsOne of the most frequently investigated incidents in the business environment is:EmbezzlementFraudEmployee theftBriberyQuestion 133 PointsA management that wishes to eliminate employee theft should do all of the following EXCEPT:Decide it is unacceptableDo something about itInvolve employees in bringing it to an endGrant amnesty once for first-time offendersQuestion 143 PointsWhich of the following is NOT an indicator of employee theft?BorrowingLiving above apparent income levelWriting bad checksSpeaking out against the companyQuestion 153 PointsAn alleged injury was not witnessed, the injury not reported immediately, and treatment not administered by a physician approved in the company’s health benefits plan. These circumstances point to a false:Workers’ compensation claimMedical services claimFinding in a civil law suitInvoiceQuestion 163 PointsThe main administrative device for capturing employment and personal references is the:Employment application formTelephonePersonal computerAssortment of public recordsQuestion 173 PointsPre-employment screening is designed to detect and filter out applicants that are felons, violence-prone individuals, drug abusers, and people that pose safety risks. This is done to:Filter out persons with learning problemsProtect the community at largeReduce costs associated with theft, injury, accidents, and medical assistance benefitsQuestion 183 PointsOne of the reasons employers conduct pre-employment background checks is because:Regular employees expect screening of new employeesThey wish to avoid public disapproval c. Laws and regulations place a duty on them to maintain a safe and secure working environment dLaws and regulations place a duty on them to maintain a safe and secure working environmentQuestion 193 PointsCertain questions cannot be asked on an employment application form, or for that matter, in any manner connected to a hiring decision. Which of the following is NOT one of those questions?Are you married?How many children do you have?Where were you born?Do you have any disabilities?Question 203 Points Checking references by mail or e-mail is not as effective as:Checking in person or by phoneReading the job descriptionTalking to the applicant’s potential supervisorSending a form to the registrar of the college attended by the applicantQuestion 213 PointsAn organization’s program for fire prevention and response often includes:A floor warden programWritten approval of local law enforcementA requirement for an access control systemProvisions for dealing with natural disastersQuestion 223 PointsA Mutual Aid and Assistance Agreement:Is an agreement in which separate agencies commit to working with one another to deal with major emergenciesDoes not include a provision for one agency to provide equipment and personnel to assist another agency during a major emergencyIs a federal government device to promote public acceptance of the Federal Emergency Management Agency (FEMA)Question 233 PointsThe Incident Command System (ICS):Is a substitute for the National Incident Management System (NIMS)Is a system for managing a major incident at the-sceneCan only be implemented by a senior representative of the Federal Emergency Management Agency (FEMA)Question 243 PointsA fire control team:Is committed to fire incidents onlyAnswers to the senior fire wardenMust include security officersIncludes maintenance personnelQuestion 253 PointsAn Emergency Operating Plan (EOP) does all of the following EXCEPT:Assign responsibilitiesIdentify likely incidentsDedicate particular resourcesDictate cost-containmentQuestion 263 PointsThe Business Continuity Plan (BCP) is:Completely separate from the EOPNever a part of an EOPIntegral to the EOPQuestion 273 Points A properly planned and executed BCP:Falls into the exclusive realm of the CSOIs written by the CSOCan be the key in preventing the death of a companyQuestion 283 PointsRecovery follows readiness and precedes:MitigationResponseRestorationQuestion 293 Points The acronym RTO stands for:Reasonable termination objectiveResponse time overallRecovery time objectiveQuestion 303 PointsIT governance is a term related to policies, procedures, and practices.TrueFalseQuestion 313 PointsThe final decision-maker in the acquisition of a security system to protect information assets belonging to the company is:The chief operations officerThe chief executive officerThe chief security officerQuestion 323 PointsThe risk of information loss is present:Except when information is under lock and keyWhen productive use of the information endsWhen a threat agent has targeted the informationQuestion 333 PointsWhich of the following is NOT a type of sensitive information?Proprietary business and technical informationPersonal data concerning applicants, employees, and former employeesInformation developed for presentation in a company’s annual report

Our assignment help experts start writing the papers as soon as the payment is done. The writers work fast to complete the task within the deadline. You will receive your assignment in your registered account prior to the submission deadline.

Place Your Order Now