Mid Term Exam

Is this your test? Login to manage it. If not, you can create a quiz just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
A specially-constructed microphone attached directly to an object or surface to be protected and which responds only when the protected object or surface is disturbed is known as:
2.
1 point
A "relock" on a vault automatically stops the bolt mechanism from operating when:
3.
1 point
To prevent cybercrime, it is not a good strategy to:
4.
1 point
Most theft is committed by:
5.
1 point
Trade secrets are generally afforded greater legal protection than other proprietary information. Which of the following is not an element of the test for a trade secret?
6.
1 point
Non-insulated security containers must satisfactorily pass a drop test of:
7.
1 point
Lighting units of 4 general types are used for protective lighting systems. Which of the following is not used:
8.
1 point
Piracy refers to the illegal duplication and distribution of recordings. Which form is not considered piracy?
9.
1 point
A microphone with large disk-like attachment used for listening to audio from great distances is known as:
10.
1 point
A sentry dog can normally not operate at full effectiveness at:
11.
1 point
Which of the following in not true with regard to electronic eavesdropping?
12.
1 point
The interior height of a vault should not exceed
13.
1 point
The unauthorized acquisition of sensitive information is known as?
14.
1 point
Which is not one of the four types of fencing authorized for use in protecting restricted areas:
15.
1 point
A craving for a drug is exhibited often by the following:
16.
1 point
Sound waves too high in frequency to be heard by the human ear, generally above 20 KHZ are known as:
17.
1 point
The intrusion detection system in which a pattern of radio waves is transmitted and partially reflected back to the antenna is known as:
18.
1 point
A security survey is known by a number of different terms which is not one of them:
19.
1 point
Protective barriers are divided into two major categories which of the following is not one
20.
1 point
The acceptable vault construction of insulated doors is a minimum reinforced thickness of:
21.
1 point
Competitive intelligence gathering is a legitimate activity which is engaged in by many firms throughout the world. The most important function of
competitive intelligence is to:
22.
1 point
The weakness of the burning bar as a burglar tool is:
23.
1 point
A major advantage of chain-link security fencing is that it affords visibility on both sides of the perimeter barrier to police and security officer:
24.
1 point
A top guard is an overhang of barbed wire or barbed tape along the top of the fence facing outward and upward at appoximately:
25.
1 point
Foil used as detector on a glass window to signal a surrepitious or forcilbe entry is an example of a(n):
26.
1 point
One whose sexual desires are directed to both men and women is known as a:
27.
1 point
Lighting units of 4 general types are used for protective lighting systems. Which of the following is not used:
28.
1 point
The temperature at which paper may be destroyed is:
29.
1 point
The major reason for the loss of sensitive information is?
30.
1 point
One of the following is not one of the desired characteristics of a statement obtained during a claim investigation:
31.
1 point
The term “eavesdropping” refers to:
32.
1 point
Electronic process media can begin to deteriorate at:
33.
1 point
In designing a proprietary information program, the area of greatest vunerability is:
34.
1 point
Which of the following is not usually applicable to a confession?
35.
1 point
Which of the following would be an acceptable computer media storage classification?
36.
1 point
When establishing a clear zone between the perimeter barrier and exterior structures, parking areas and natural or manmade features the clear zone should be a minimum of:
37.
1 point
Which of the following characteristics of protective lighting is incorrect?
38.
1 point
All proprietary information is sensitive while not all sensitive information is proprietary. An example of information which is not proprietary even though the organization would treat it as sensitive is:
39.
1 point
The type of fencing generally used for protection of permanent limited and exclusion areas is:
40.
1 point
Piers and docks located on an installation should be safeguarded by illuminating both water approaches and the pier area. Decks on open piers should be illuminated to at least:
41.
1 point
The investigation's best approach to questioning relies on the following:
42.
1 point
Security vaults differ from safes to that:
43.
1 point
The degree of protection desired in any installation predicated upon an analysts of the following two factors
44.
1 point
Which of the following is not true with regard to door latches?
45.
1 point
The frequency of a reinvestigation of the "financial lifestyle" inquiry should generally be:
46.
1 point
A system using inaudible sound waves to detect the presence of an intruder or other disturbance of the inaudible sound system is known as:
47.
1 point
The class of a person under a duty to safeguard a proprietary secret is known as?
48.
1 point
Which of the following is not an approved UL record safe classification
49.
1 point
The intrusion detection system that is used on safes, walls, and openings in an effort to establish an electronic field around an object to be protected is known as a(n)
50.
1 point
When establishing a clear zone between the perimeter barrier and exterior structures, parking areas and natural or manmade features the clear zone should be a minimum of: