Exam 3: Private Security Concepts, Tools, and Systems Integration or Convergence

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Outline and describe the essential components of a good risk management program.

(Essay)
4.9/5
(38)

A security survey is a/an ___________ physical examination of a business or premises and a thorough inspection of all operational systems and procedures.

(Multiple Choice)
4.8/5
(37)

A security survey is an exhaustive physical examination of a business or premises and a thorough inspection of all operational systems and procedures.

(True/False)
4.9/5
(35)

According to the National Burglar and Fire Alarm Association (NBFAA), what is one major problem and issue regarding alarms?

(Multiple Choice)
4.9/5
(46)

The six top security firms in the United States employed 40% of all security guards.

(True/False)
4.8/5
(45)

Many organizations feel that proprietary security officers are more trustworthy than contract security officers.

(True/False)
4.9/5
(26)

In-house security personnel, who are familiar with the company personnel and facilities, are the only ones qualified to do security surveys.

(True/False)
4.9/5
(27)

Microprocessor cards that have micro-controllers built into them, called _________________, can store information and carry out individual applications.

(Essay)
4.8/5
(35)

A management and control unit that monitors all security functions is called the _______________.

(Essay)
4.8/5
(37)

What is used in many large organizations to control and monitor all security operations in the corporation?

(Multiple Choice)
4.8/5
(32)

__________________, which are linked to the hospitals' patient registration databases, are used at admitting, the emergency department, one-day surgery, and all inpatient and outpatient registration points.

(Essay)
4.9/5
(31)

Which term in security operations is the process of balancing the cost of security with the overall corporate goal of producing goods, services and profits?

(Multiple Choice)
4.7/5
(39)

What is used to record patrol activities of guards and the time and location of each visit they make?

(Multiple Choice)
4.7/5
(43)

Which of the following is not an often cited reason for security personnel to voluntarily terminate their employment?

(Multiple Choice)
4.8/5
(33)

________________ response requires alarm companies to confirm break-ins or security breaches before officers will be deployed to the scene of a ringing alarm.

(Essay)
4.8/5
(34)

What type of Access Control System utilizes some unique physical trait or physiological characteristic?

(Multiple Choice)
4.9/5
(39)

When determining an effective risk assessment, which of the following items should not be included?

(Multiple Choice)
4.8/5
(20)

What type of team coordinates all activities with organizational, emergency and governmental personnel upon initiation of an emergency?

(Multiple Choice)
4.8/5
(36)

According to a USA Today article in 2003, the majority of the one million plus security guards are unlicensed, untrained, and not subject to background checks.

(True/False)
4.8/5
(42)

System convergence is an effort to bring all systems together.Explain how this can benefit private security.

(Essay)
4.8/5
(34)
Showing 21 - 40 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)