Deck 5: Risk Management the Core of Private Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/30
Play
Full screen (f)
Deck 5: Risk Management the Core of Private Security
1
Each component of the security system should be periodically evaluated and changes made before they are needed.
False
2
An attack tree visually represents the goal of an attack on some asset as the trunk of the tree and possible/probable ways to accomplish the attack as branches.
True
3
Alternatives for handling risk include all of the following except
A)risk elimination.
B)risk reduction.
C)risk spreading.
D)risk speculation.
A)risk elimination.
B)risk reduction.
C)risk spreading.
D)risk speculation.
D
4
Anticipating, recognizing and analyzing risks is known as
A)disaster management.
B)emergency management.
C)risk management.
D)terrorism management.
A)disaster management.
B)emergency management.
C)risk management.
D)terrorism management.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
5
The professional security manager must devote as much time to quantifying and qualifying security initiatives as any other department within an organization to justify resource allocations and expenditures.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
6
The security survey (audit) is not a critical objective, on-site analysis of the total security system.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
7
The probability that something will occur uses the formula P= f/n.This formula means:
A)P=probability f=financial
N=number of times
B)P=probability f=actual occurrences of the event
N=number of circumstances
C)P=probability f=frequency
N=number
D)P=probability f=factor of ten divided by twenty
N=number of days
A)P=probability f=financial
N=number of times
B)P=probability f=actual occurrences of the event
N=number of circumstances
C)P=probability f=frequency
N=number
D)P=probability f=factor of ten divided by twenty
N=number of days
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
8
Which type of risk involves risk with the potential for both benefits and losses?
A)pure risk
B)dynamic risk
C)realistic risk
D)acceptable risk
A)pure risk
B)dynamic risk
C)realistic risk
D)acceptable risk
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
9
The following guidelines provide a basic guideline to help security respond to incidents quickly and efficiently.
A)protect life and safety
B)contain the damage
C)asses the extent of damage
D)all of the above
A)protect life and safety
B)contain the damage
C)asses the extent of damage
D)all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
10
Qualitative risk assessment can typically start to show significant results within a few days.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
11
The security survey (audit) is a(n) __________________ analysis of the total security system.
A)critical
B)objective
C)on-site
D)all of the above
A)critical
B)objective
C)on-site
D)all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
12
Organizations that do not have a comprehensive risk management program in place leave themselves open to disgruntled employees and customers as well as to potential civil liability.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
13
Preventing loss through risk management always includes terrorism analysis.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
14
Which type of risk involves the potential for injury, damage or loss with no possible benefits?
A)pure risk
B)dynamic risk
C)realistic risk
D)acceptable risk
A)pure risk
B)dynamic risk
C)realistic risk
D)acceptable risk
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
15
Four major types of hazards are:
A)physical, moral, typical, vulnerable
B)physical, moral, morale, critical
C)physical, moral, morale, legal
D)physical, moral, morale, on-going
A)physical, moral, typical, vulnerable
B)physical, moral, morale, critical
C)physical, moral, morale, legal
D)physical, moral, morale, on-going
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
16
A fundamental risk could be rapid inflation, natural disasters, or even war.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
17
Preventing loss through risk management includes all of the following, except
A)risk analysis.
B)media involvement.
C)policy formulation.
D)specification of a protection plan.
A)risk analysis.
B)media involvement.
C)policy formulation.
D)specification of a protection plan.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
18
Factors to consider in risk analysis are
A)vulnerability..
B)probability.
C)criticality.
D)all of the above
A)vulnerability..
B)probability.
C)criticality.
D)all of the above
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
19
Each component of the security system does not need to be periodically evaluated (audited) and changed as needed.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
20
Strategic risk is the uncertainty regarding an organization's financial goals and objectives.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
21
Risk management involves taking steps to reduce or prevent such risks and __________ the results.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
22
The number of times a risk is reasonably expected to occurring during one year is called the _________________.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
23
Conducting ___________ and ________________ risk assessments can give security managers a fairly comprehensive picture of an organization's security needs.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
24
The information needed for a security survey is obtained by ____________ and by talking to personnel.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
25
Risk management is anticipating, ____________ and ______________ risks.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
26
The ______________________ focuses on the needs of the individual business, not of the business sector in general.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
27
The information needed for a security survey is obtained by _________ and by __________ to personnel.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
28
Risk management is both a __________ and _______________ responsibility.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
29
The ________________ model focuses on the quality of the products and services an organization provides.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck
30
Three factors to consider in risk analysis are vulnerability, __________ and criticality.
Unlock Deck
Unlock for access to all 30 flashcards in this deck.
Unlock Deck
k this deck