Test 1
Test 2
Test 3
Test 4
Mixture Q's
100

The Most cost effective tool for gathering information during an investigation is which of the following...

a. undercover work           b. Hidden cameras

c. Interviewing                 d. rolling surveillance

what is interviewing

100

The first major undercover investigation was used in which of the following cases?

a. Molly Maguires Underground organization

b. The Weather Underground organization

c. The Black Panther organization

d. The McDowell espionage case

What is A- Molly Maguires Underground organization

100

Air transport is vulnerable to all the following security issues except:

a. safety 

b. terrorists

c. Increased fuel prices

d. theft

What is C- Increased Fuel Prices

100

Argus and Schon, in 1978 developed a theory known as the “double loop learning” model. With this double loop communications in an organization, all employees can experience which of the following?

a. Becoming harder workers because they will know how to do their jobs better.

b. Becoming stakeholders who have a vested interested in the success of the security awareness effort.

c. Becoming more dependent on their employers and therefore reducing turnover and increasing company profits.

d. Becoming more loyal to their unions for union participation in the communications process.

What is B- Becoming stakeholders who have a vested interested in the success of the security awareness effort.

100

The management of disruptive or violent behavior consists of five states or stages. Which of the following is not one of these stages?

a. Evaluating risk analysis

b. Planning a proactive-preventive strategy

c. Arresting the subject and using physical restraints

d. Implementing the plan

What is C- Arresting the subject and using physical restraints

200

Alarm Systems like all other systems, do not function by themselves without human intervention. In all cases, at some point, a human interface with the alarm system. To assist the operation, there are numerous devices available. Which of the following is one of those devices? 

a. audible alarm devices    b. alarm printers

c. visual displays               d. all the above

what is D- all the above

200

To develop security awareness in a security officer department, which of the following is not necessary, having little to do with security awareness?

a. Each new employee should be given a policy and procedure orientation.

b. Each new employee should be given a payroll and benefits orientation.

c. Each employee should be included in scheduled meetings, training, focus group and surveys.

d. Each employee should be sent security updates in emails, newsletters, and webcasts.

What is B- Each new employee should be given a payroll and benefits orientation

200

The term Faithful Reproduction means which of the following?

a. The message was both received and understood

b. the message was timely

c. the message was brief

d. the message was expected

What is A- the message was both received and understood

200

Based on organizational needs there are several major purposes of patrol. Which of the following is one of those purposes of patrol?

a. Detection

b. Prevention

c. Investigation

d. All the above

What is D- all the above

200

Report writing relevant to the incident must include all of the following except

a. What happened

b. What time it happened

c. The exact location of where it happened

d. The investigator’s opinions and conditions

What is D- The investigator’s opinions and conditions

300

Although based upon the same concept, fires can be divided into four basic groups. Which of the following is not one of those groups?

a. Solid combustible materials like paper and wood

b. Combustible gasses like highly explosive CO2

c. Combustible metals like magnesium

d. Electrical materials like breaker boxes or fray

What is B.- Combustible gasses like highly explosive CO2

300

Alarm systems are notorious for generating false alarms. Which of the following is not a cause for false alarm?

a. Poor installation

b. An attempted intrusion where the intruder leaves before the police get there.

c. User error

d. Electrical storm where the telephone lines are cut

What is B- An attempted intrusion where the intruder leaves before the police get there.

300

Which of the following is not one of the five avenues in which to address risk?

a. Risk creation

b. risk avoidance

c. risk mitigation

d. risk spreading

What is A- Risk Creation


300

A glass-break sensor is a sensor with which of the following characteristics?

a. Not a dual-tech type sensor but a single source/single purpose sensor

b. Usually too expensive for the average system and therefore is almost never used

c. Operates on ultrasonic audio frequencies designed to reduce false alarms

d. Designed to detect glass breakage of every kind including laminated glass

what is C. Operates on ultrasonic audio frequencies designed to reduce false alarms

300

Investigations are logical, systematic processes. Investigations use all the following except

a. Productive reasoning

b. Inductive reasoning

c. Logical reasoning

d. Deductive reasoning

What is A- Productive reasoning

400

Examples of negligence lawsuits included all the follow except

a. intentional infliction of metal distress

b. failure to provide adequate security

c. failure to have contingency or evacuation plans in place

d. Failure to warn someone is at risk as a result of a security exposure

What is A.-Intentional infliction of mental distress

400

The protection officer who observes a safety violation by a worker should do all of the following except

a. Record the violators name

b. Notify the workers supervisor

c. Do nothing because what the employees do is none of our business

d. Document the event in a daily activity report including a description of the event, name and employee number f the violator and the supervisor’s name to whom it should be reported.

What is C- Do nothing because what the employees do is none of our business

400

For arrest purpose, security officers are considered by the law to be 

a. exempt from laws

b. deputies

c. land owners

d. private citizens

What is D- private citizens

400

Drug dependence follows a predictable course of action which, most often, begins with which of the following?

a. Experimentation

b. Prescription use

c. Heredity traits

d. Compulsive personality urges

What is A- Experimentation

400

There are many categories of civil actions. Which of the following is not one of them?

a. Negligence lawsuits

b. Intentional tort lawsuits

c. Contract law

d. Burglary law

What is D- Burglary Law

500

Authority to make a citizens arrest can only come from which of the following?

a. Department policy and training

b. federal laws

c. State laws

d. Supreme court cases

what is B- federal laws


500

A psychoactive drug is a drug that alters which of the following internal bodily functions? Choose the one best answer

a. The heart

b. The liver

c. The central nervous system

d. The brain

What is D- the brain

500

There are numerous formats for resumes. Which of the following is not one of those formats?

a. Perpetual

b. functional

c. Chronological

d. None of the above

What is A- perpetual

500

Terrorist activities are contingent on all of the following except

a. The capabilities of the terrorist organization

b. The philosophy of the terrorist organization

c. Overcoming the fact that most terrorists are easily detected by our FBI

d. The area in which the terrorists are operating

What is C. -Overcoming the fact that most terrorists are easily detected by our FBI

500

Use of force involves three mandatory components. Which of the following is not one of those components?

a. Belief that use of force is required to accomplish a legal goal.

b. The use of force is producing enough pain to send a message of control

c. Use of force s necessary to achieve compliance

d. Use of force is reasonably based on the totality of the circumstances and the subject’s refusal to cooperate with verbal de-escalation.

What is B- the use of force is producing enough pain to send a message of control