Physical Protection
Cyber You
Name That Threat
Why Risk it?
Communications
100

What do you call a physical obstacle use to bar entry or cross over a line?

What is a barrier

100

Name one personal piece of information that must never be shared when logging into your computer?

What is your username or password.

100

There two types of terrorist. Name the two?

What is domestic and foreign/international terrorist.

100

What do you call something that is potentially unprotected and open to attack?

What is vulnerable?

100

Beside using your voice to call out, what portable device can you use to communicate more effectively?

What is a radio?

200

When there are no human presences, a device or system is used. Names this type of device or system?

What is an alarm or intrusion system device.

200

During the war between Greece and Troy, what do you call that tricked that defeated Troy and it's also a malicious program?

What is a Trojan.

200

When someone is influence and turned into a follower, we call that person being what?

What is being radicalized.

200

There are four types of risk to consider. One side step it, let it alone, share it or what?

What is pass it, insurance?

200

Besides a cellphone, radio, your voice or a landline, what other electronic system can be used to communicate? Think of the airport.

What is a PA or intercomm system?

300

When visibility is a must to detect possible criminal activities in the dark, this type of utility must be employed? 

What are security lights.

300

When a system is locked out, what is another way a programmer can gain access into the computers?

What is a backdoor.

300

Name a very popular form of communication used by criminals to reach out to it's audience or spread messages?

What is social media?

300

When the weather turns bad and rain is expected, what possible accident can happen to someone while walking on the premises?

What is slip and fall?

300

While performing patrols and other duties, and at the end of the day you need to write a report, what would you refer back to in order to complete your report in detail and more thoroughly?

What are notes in your notebook?

400

Name a type of barrier that is not man made?

What are natural barriers.

400

How does a piece of information get traced back to your system or know your computer's whereabouts?

What is an IP address.

400

In general, what do you call a violent and physical incident while on duty on the job?

What is workplace violence.

400

CCTV's are a great addition to the overlapping security systems, but what else should an officer do as part of that security system to reduce the chance of intrusion or criminal intent?

What is a patrol?

400

When changing shifts, is it advisable to let the other shift personnel know what is going on and what occurred on your shift. What is this called?

What is a pass down or turn over?

500

Name a types of access control form that are used but are not solid blocking structures or man monitored barriers?

What are signs.

500

Besides WiFi and Hotspots, what is another way to get internet access either at home or at work?

What is a landline or cable connection.

500

When someone is acting strange or even displaying violent and belligerent behavior, what would you suspect that person might be on? 

What is drugs?

500

If nothing ever happens on your watch, routines are quickly neglected or duties are not taken seriously. What is this condition called?

What is complacency.

500

What do you call it where the lines of communication runs between company managers, supervisors to the line officers and visa versa?

What is the chain of command?

M
e
n
u