Вы находитесь на странице: 1из 6

Republic of the Philippines

BATANGAS STATE UNIVERSITY


Pablo Borbon – Main I, Batangas City

Midterm Examination
LEA 2 – Industrial Security Management

Name: Course/ Yr. & Section: Date:

_____1. This provides illumination on areas to be secured that adds psychological deterrence.
a. Locking System c. Protective Cabinets
b. Protective Lighting d. Key System
_____2. These are among the major threats confronting an organization.
a. employee crime c. employee misconduct
b. employee character d. employee performance
_____3. These are the lights commonly used in parking areas.
a. Search Lights c. Flood Lights
b. Fresnel Lights d. Street Lights
_____4. The following can result in potentially devastating lawsuits and loss of business, except:
a. criminal acts committed by outsiders c. inappropriate behavior of employees
b. substandard job performance d. competency of authorities and employees
_____5. This is a stand-by lighting that can be utilized in the event of electric failure, either due to local equipment or
commercial power failure.
a. Stationary Luminary c. Movable Lighting
b. Stand-by Lighting d. Emergency Lighting
_____6. These are wide beam units primarily used to extend illumination in long horizontal strips to protect approaches to
perimeter barrier.
a. Search Lights c. Flood Lights
b. Fresnel Lights d. Street Lights
_____7. This can be stationary or portable and consists of manually operated searchlights. It can supplement or temporarily
replace other types of security lighting.
a. Stationary Luminary c. Movable Lighting
b. Stand-by Lighting d. Emergency Lighting
_____8. These are those who seek to exploit their legitimate access to company assets for unauthorized purposes.
a. Insiders c. Middleman
b. Outsiders d. Alien
_____9. This provides continuous illumination of a protected area during the hours of darkness, but it can be turned on
manually or by special device or other automatic means.
a. Stationary Luminary c. Movable Lighting
b. Stand-by Lighting d. Emergency Lighting
_____10. This provide an opportunity for old and new employees to gain necessary skills to perform their responsibilities
within the organization’s security network.
a. On-going Personnel Security c. Security Training & Awareness Programs
b. Pre-employment Screening d. Personnel Security
_____11. This is a type of stationary luminary which is focused on certain objects than the background.
a. Protective Lighting c. Glare Projection Type
b. Ordinary Lighting d. Controlled Lighting
_____12. This may be provided to encourage staff to see those in security as friendly and approachable and for reporting
security concerns.
a. proof of billing and account number c. marriage contract and birth certificate
b. contact numbers and email address d. community tax certificate and diploma
_____13. This produces bright white light with its intensity focused on the intruder who is made highly visible but unable
to easily see what lies ahead.
a. Protective Lighting c. Glare Projection Type
b. Ordinary Lighting d. Controlled Lighting
_____14. Trainers and security personnel should demonstrate this type of support for the security policy (particularly from
management).
a. conditional c. uncontrollable
b. insatiable d. unconditional
_____15. This is the most common type of protective lighting consisting of a series of fixed luminaries.
a. Stationary Luminary c. Movable Lighting
b. Stand-by Lighting d. Emergency Lighting
_____16. Trainers and security personnel should explain the organization’s security policies ________. If there are some
areas that are more sensitive than other and where access is restricted, this should be clearly stated.
a. openly c. strictly
b. secretly d. covertly
_____17. These lights project light in a concentrated beam used in boundaries and fences.
a. Search Lights c. Flood Lights
b. Fresnel Lights d. Street Lights
_____18. Trainers and security personnel should give employees a ________ of the threats to the organization.
a. realistic picture c. created imagination
b. dimensional structure d. rough illustrations
_____19. These are highly focused incandescent lamps used to pinpoint potential trouble spot.
a. Search Lights c. Flood Lights
b. Fresnel Lights d. Street Lights
_____20. Trainers and security personnel should encourage cultures which resolve and correct rather than focus on
establishing ________ .
a. Hoaxes c. blame
b. criticism d. gossips
_____21. This is a mechanical, hydraulic, electrical or electronic device designed to prevent entry into a building, room,
container or hiding place and to prevent the removal of items without the consent of the owner.
a. padlock c. locking system
b. Peterman d. lock
_____22. Trainers and security personnel should avoid ________ the risks and threats faced by the organization to gain
more credibility.
a. exaggerating c. inventing
b. degrading d. belittling
_____23. This is a term used in England for lock picker, safe cracker and penetrators of restricted areas or rooms.
a. padlock c. locking system
b. Peterman d. lock
_____24. Trainers and security personnel should avoid making false claims about security to ________ employees into
compliance.
a. excite c. frighten
b. arouse d. deliver
_____25. This is a portable and detachable lock having or sliding hasp that passes through a staple ring.
a. padlock c. locking system
b. Peterman d. lock
_____26. This shall be provided regularly by trainers and security personnel to incorporate new procedures in security in
order to help maintain standards and ensure that employees understand why these are important to follow.
a. Crash Course c. Workshop
b. Refresher Trainings d. Symposium and Seminar
_____27. These are types of locks used in cabinets, drawers, safe deposit box.
a. lever locks c. warded locks
b. disc-tumble locks d. electromagnetic locks
_____28. These are the more common insider activities that caused numerous companies serious losses.
a. employee crime and employee misconduct
b. unauthorized disclosure of information and process corruption
c. unauthorized entry and exit of employees
d. unauthorized entry and exit of outsiders
_____29. These are locks used in car doors.
a. lever locks c. warded locks
b. disc-tumble locks d. card-operated locks
_____30. These individuals, who seek to gain access, might hire insiders to get through a company’s sophisticated physical
and IT security measures.
a. Insiders c. Middleman
b. Outsiders d. Alien
_____31. These offer little security. These are used only to provide privacy.
a. lever locks c. warded locks
b. disc-tumble locks d. combination locks
_____32. The following are the common insider’s motivation to have an access to an organization’s assets for unauthorized
purposes, except:
a. political or religious ideology c. revenge
b. notoriety and financial gain d. all of the foregoing
_____33. The following are the purposes of physical barriers, except:
a. to control the movement of people and vehicles
b. to segregate or compartmentalize sensitive areas
c. to provide physical protection to objects, materials and processes
d. to isolate dishonest and dangerous employees
_____34. This is critical to counter threats considering that the human factor could quite possibly be the weakest link in the
organization’s security chain.
a. On-going Personnel Security c. Security Training & Awareness Programs
b. Pre-employment Screening d. Personnel Security
_____35. This is a key to a single lock within a master keyed system.
a. Master Key c. Change Key
b. Grand Master Key d. Sub-Master Key
_____36. This involve the evaluation of an individual based on their on-line reputation. This includes searching for what
they say or what other say about them on the internet.
a. Interviews c. Media Searches
b. Identity Verification d. Qualification and Employment Check
_____37. This is a key that will open everything in a system involving two or more master key groups.
a. Master Key c. Change Key
b. Grand Master Key d. Sub-Master Key
_____38. This involves the verification of information regarding the educational or professional qualifications of an
applicant.
a. Interviews c. Qualification Check
b. Identity Verification d. Employment Check
_____39. This is a key will open all lock with a particular area or grouping in a given facility.
a. Master Key c. Change Key
b. Grand Master Key d. Sub-Master Key
_____40. This involves checking the applicant’s personal details against external databases.
a. Paper-based Approach c. Personal Approach
b. Media Searches d. Electronic Approach
_____41. This is a special key of opening a series locks.
a. Master Key c. Change Key
b. Grand Master Key d. Sub-Master Key
_____42. This involves the verification of the applicant’s employment history in terms of dates and employment and
position.
a. Interviews c. Qualification Check
b. Identity Verification d. Employment Check
_____43. These are considered as the third line of defense against unauthorized persons.
a. Locking System c. Protective Cabinets
b. Protective Lighting d. Key System
_____44. This is a system of policies and procedures that manages the risk of staff or contractors exploiting legitimate
access to an organizations’ assets or premises for unauthorized purposes.
a. Personnel Security c. Line of Defense
b. Physical Barrier d. Physical Security
_____45. This a system of controlling keys devised and regulated for disposal, storage and withdrawals.
a. Locking System c. Protective Cabinets
b. Protective Lighting d. Key System
_____46. This involves requesting original documents such as those that corroborate the applicant’s full name, signature,
date of birth and full permanent address.
a. Paper-based Approach c. Personal Approach
b. Media Searches d. Electronic Approach
_____47. This is an invisible or visible beam is emitted and when disturbed, it activates an alarm or mechanical device that
opens a door or lift movable barriers, activated by light.
a. Intrusion Alarm c. Laser-beam Alarm
b. Photocell Alarm d. Alarm System
_____48. This is a critical measure in the screening process that other measures should only come second after this process.
a. Interviews c. Media Searches
b. Identity Verification d. Qualification and Employment Check
_____49. This refers to any detecting devices using electric and their combinations to signal an alarm when actuated.
a. Intrusion Alarm c. Laser-beam Alarm
b. Photocell Alarm d. Alarm System
_____50. This provides an opportunity to discuss the candidate’s suitability for employment.
a. Interviews c. Media Searches
b. Identity Verification d. Qualification and Employment Check
_____51. This is a laser emitter that floods the wall or fence with a beam so that when this beam is disturbed by a physical
object, an alarm is activated.
a. Intrusion Alarm c. Laser-beam Alarm
b. Photocell Alarm d. Alarm System
_____52. This shall be completed by job applicants and it is required among them to provide all relevant information and
confirm its correctness with a signature.
a. Resume c. Personal Data Sheet
b. Bio-data d. Application Form
_____53. Job interview is important because of the following reasons, except:
a. it allows employer to clarify information in the application form
b. it allows employer to ask for other information not covered in the application form
c. it allows employer to solicit indecent proposal from the applicant
d. it allows employer to probe candidates about their responses
_____54. This is a component of an alarm system that transmits what is detected.
a. Triggering Device c. Transmission
b. Annunciation d. Sound and Visual Activation
_____55. This is the heart of the alarm system of the detecting device and is the component that activates the triggering
unit.
a. Triggering Device c. Transmission
b. Annunciation d. Aural and Visual Activation
_____56. One of the purposes of on-going personnel security is to carry out ________ to resolve suspicions or provide
evidence for disciplinary procedures.
a. modifications c. development
b. investigations d. background checking
_____57. This is one of the main reasons why individuals use false identities that involves individuals who have ill
intentions of committing credit fraud or unqualified applicants ho falsify educational qualifications to obtain employment.
a. To avoid detection c. For dishonest financial gain
b. To avoid financial liability d. To legally obtain genuine documents
_____58. The goal of security training and awareness programs is to encourage workers to accept ________ for security
and equip them to make judgment calls that procedures cannot always predict.
a. personal responsibility c. personal conviction
b. personal sacrifice d. personal commitment
_____59. This the one which emits those aural or visual signals or both.
a. Triggering Device c. Transmission
b. Annunciation d. Sound and Visual Activation
_____60. This is a supplemental physical barriers in a form of sound that cause alarm installed indoors or outdoors in an
installation.
a. Locking System c. Protective Alarms
b. Protective Lighting d. Key System
_____61. This need to be updated, with all policies, procedures and safeguards consolidated, and all security related
components complementing one another.
a. Security Survey c. Security Professionals
b. Security Inspection d. Security Plan
_____62. This is the common purpose of a security survey, except:
a. To identify, control, arrest and/ or neutralize all insiders and outsiders.
b. To identify and measure the vulnerabilities to the facility.
c. To identify and measure the vulnerabilities to specific assets.
d. To determine what opportunities exist to exploit current security policies.
_____63. During this stage, information is discovered and developed.
a. Transfer c. Disposition
b. Creation d. Storage and Retrieval
_____64. These refers to formulas, patterns, compilations, programs, devices, methods, techniques, and processes that
derive economic value from not being generally known and ascertainable except by illegal means.
a. Patents c. Trade Secrets
b. Trademarks d. Copyrights
_____65. These are information relating to employees.
a. Secret Information c. Restricted Information
b. Confidential Information d. Private Information
_____66. As a security measure, exit interview is an opportunity to accomplish the following, except:
a. Remind employees of his obligations c. Obtain all passwords or encryption keys
b. Convince employees to stay d. Recover as many of the organizational assets
_____67. The following are the additional steps that should be considered to reduce the employees’ access to assets, except:
a. changing passwords to common systems c. retaining combinations to storage areas
b. changing door codes to common areas d. blocking the employees’ security pass
_____68. This can be in the form of photocopying, printing or sending through electronic mail.
a. Duplication c. Protection
b. Compilation d. Restoration
_____69. This option could provide the employee with an opportunity to abuse his access and damage the organization and
should therefore be used only if there is no risk.
a. Allow employee to carry on working during their contractual notice period.
b. Allow employee to work during their contractual notice but with reduced access.
c. Ask employee to leave immediately, possibly under supervision.
d. Allow employee to work and stay as much as he want.
_____70. These refers to words, names, symbols, devices, or combinations thereof used by manufacturers or merchants to
differentiate their goods and distinguish them from products that are manufactured or sold by others.
a. Patents c. Trade Secrets
b. Trademarks d. Copyrights
_____71. This generally considered as the best course of action for an employee about to undergo exit procedures.
a. Allow employee to carry on working during their contractual notice period.
b. Allow employee to work during their contractual notice but with reduced access.
c. Ask employee to leave immediately, possibly under supervision.
d. Allow employee to work and stay as much as he want.
_____72. This could apply to employees who had extremely sensitive positions.
a. Allow employee to carry on working during their contractual notice period.
b. Allow employee to work during their contractual notice but with reduced access.
c. Ask employee to leave immediately, possibly under supervision.
d. Allow employee to work and stay as much as he want.
_____73. Information is considered ________ when it is not readily accessible to others. This was created by the owner
through the expenditure of considerable resources.
a. sensitive c. unique
b. extra-ordinary d. proprietary
_____74. This is a record, the loss of which may cause inconvenience but could be readily replaced and may not present an
insurmountable obstacle to the prompt restoration of the business.
a. Class I – Vital Document c. Class III – Useful Document
b. Class II – Important Document d. Class IV – Non-essential Document
_____75. This stage involves a process wherein people act on the information for the purpose of making a decision based
on the information.
a. Disposition c. Creation
b. Transfer d. Use
_____76. This is a thorough procedure on personnel departure which ensure that appropriate actions are taken to protect the
organization without unnecessarily disrupting the relationship with the departing employee.
a. Addressing Behavior of Concern c. Controlling Employee Access
b. Exit Procedures d. Security Training and Awareness
_____77. These are protections given by a national government to creators of original literary, dramatic, musical and
certain other intellectual works.
a. Patents c. Trade Secrets
b. Trademarks d. Copyrights
_____78. This is recognized as an effective measure to control employees’ access to secured facilities.
a. Requiring employees to have a body guard c. Requiring employees to wear security passes
b. Requiring employees to submit fingerprints d. Requiring employees to wear uniforms
_____79. The organization can employ this measure from photographic identification cards, bar codes, voice analysis and
retinal scans to enhance entry restrictions within high security areas inside the facility.
a. Security Survey c. Restricted Areas and Identification
b. Security Screening d. Technology Security Measures
_____80. This involves the delivery of information from active to inactive storage.
a. Use c. Creation
b. Transfer d. Disposition
_____81. If there is a clear breach of security policy or if further evidence of wrongdoings emerges, those responsible for
________ should be informed so that they can conduct further investigation.
a. physical security c. document security
b. personnel security d. information security
_____82. This is information of such value or sensitivity that its unauthorized disclosure could have a substantially
detrimental effect on the organization’s business.
a. Secret Information c. Restricted Information
b. Confidential Information d. Private Information
_____83. This stage in information cycle must ensure the integrity of the information, its timely accessibility to authorized
users, and its protection from criminal intervention.
a. Creation c. Storage and Retrieval
b. Use d. Transfer
_____84. The ________ of a copyright has the exclusive right to reproduce his work, prepare derivative works based on it,
distribute copies and perform or display it publicly.
a. Beneficiary c. thief
b. recipient d. owner
_____85. This identifies people, things, processes that are necessary to continuation of the business or work before the
focus is directed to the potential threats that may interrupt operations.
a. Loss Prevention c. Risk Appraisal
b. Needs Assessment d. Crime Prevention
_____86. The organization may use this to prevent individuals from accessing communication or data storage media from
external sources.
a. Security Survey c. Restricted Areas and Identification
b. Security Screening d. Technology Security Measures
_____87. This is a record that may include daily files, routine in nature, the loss of which will not affect the organization’s
operation.
a. Class I – Vital Document c. Class III – Useful Document
b. Class II – Important Document d. Class IV – Non-essential Document
_____88. This is a type of sensitive information that the unauthorized disclosure of which could cause serious damage to
the organization’s business.
a. Secret Information c. Restricted Information
b. Confidential Information d. Private Information
_____89. This method should depend on the amount of information and the type of media used.
a. Duplication of Information c. Evaluation of Information
b. Disposal of Information d. Transmittal of Information
_____90. This is a record, reproduction of which will involve considerable expense and labor or considerable delay.
a. Class I – Vital Document c. Class III – Useful Document
b. Class II – Important Document d. Class IV – Non-essential Document

_____91. In short, physical security is a ________ placed between the potential intruder and the object to be protected.
c. regular set of barriers c. unique type of barriers
d. system of barriers d. accessible barriers
_____92. This refers to a logical set of tangible elements and measurements adopted to prevent unauthorized access to
equipment, facilities, materials, documents and personnel.
a. Personnel Security c. Line of Defense
b. Physical Barrier d. Physical Security
_____93. The following are the objectives of physical security, except:
a. protect assets from damage c. protect assets from compromise
b. protect assets from contamination d. protect assets from loss
_____94. This refers to a a barrier or system of barriers placed between the potential intruder and the matter to be protected.
This also pertains to protective device against hazards, threats, vulnerability and risks.
a. Personnel Security System c. Line of Defense
b. Physical Barrier d. Physical Security
_____95. These are usually electrical or electronics devices used to provide assistance to guard personnel. Ex. protective
lightings, anti-intrusion devices.
a. Human Barriers c. Animal Barriers
b. Energy Barriers d. Structural Barriers

Prepared by:

_________________________
Dr. Jeffery C. Arrieta
Program Chairman, BS Criminology

Вам также может понравиться