Deck 5: Risk Management the Core of Private Security

ملء الشاشة (f)
exit full mode
سؤال
Each component of the security system should be periodically evaluated and changes made before they are needed.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
An attack tree visually represents the goal of an attack on some asset as the trunk of the tree and possible/probable ways to accomplish the attack as branches.
سؤال
Alternatives for handling risk include all of the following except

A)risk elimination.
B)risk reduction.
C)risk spreading.
D)risk speculation.
سؤال
Anticipating, recognizing and analyzing risks is known as

A)disaster management.
B)emergency management.
C)risk management.
D)terrorism management.
سؤال
The professional security manager must devote as much time to quantifying and qualifying security initiatives as any other department within an organization to justify resource allocations and expenditures.
سؤال
The security survey (audit) is not a critical objective, on-site analysis of the total security system.
سؤال
The probability that something will occur uses the formula P= f/n.This formula means:

A)P=probability f=financial
N=number of times
B)P=probability f=actual occurrences of the event
N=number of circumstances
C)P=probability f=frequency
N=number
D)P=probability f=factor of ten divided by twenty
N=number of days
سؤال
Which type of risk involves risk with the potential for both benefits and losses?

A)pure risk
B)dynamic risk
C)realistic risk
D)acceptable risk
سؤال
The following guidelines provide a basic guideline to help security respond to incidents quickly and efficiently.

A)protect life and safety
B)contain the damage
C)asses the extent of damage
D)all of the above
سؤال
Qualitative risk assessment can typically start to show significant results within a few days.
سؤال
The security survey (audit) is a(n) __________________ analysis of the total security system.

A)critical
B)objective
C)on-site
D)all of the above
سؤال
Organizations that do not have a comprehensive risk management program in place leave themselves open to disgruntled employees and customers as well as to potential civil liability.
سؤال
Preventing loss through risk management always includes terrorism analysis.
سؤال
Which type of risk involves the potential for injury, damage or loss with no possible benefits?

A)pure risk
B)dynamic risk
C)realistic risk
D)acceptable risk
سؤال
Four major types of hazards are:

A)physical, moral, typical, vulnerable
B)physical, moral, morale, critical
C)physical, moral, morale, legal
D)physical, moral, morale, on-going
سؤال
A fundamental risk could be rapid inflation, natural disasters, or even war.
سؤال
Preventing loss through risk management includes all of the following, except

A)risk analysis.
B)media involvement.
C)policy formulation.
D)specification of a protection plan.
سؤال
Factors to consider in risk analysis are

A)vulnerability..
B)probability.
C)criticality.
D)all of the above
سؤال
Each component of the security system does not need to be periodically evaluated (audited) and changed as needed.
سؤال
Strategic risk is the uncertainty regarding an organization's financial goals and objectives.
سؤال
Risk management involves taking steps to reduce or prevent such risks and __________ the results.
سؤال
The number of times a risk is reasonably expected to occurring during one year is called the _________________.
سؤال
Conducting ___________ and ________________ risk assessments can give security managers a fairly comprehensive picture of an organization's security needs.
سؤال
The information needed for a security survey is obtained by ____________ and by talking to personnel.
سؤال
Risk management is anticipating, ____________ and ______________ risks.
سؤال
The ______________________ focuses on the needs of the individual business, not of the business sector in general.
سؤال
The information needed for a security survey is obtained by _________ and by __________ to personnel.
سؤال
Risk management is both a __________ and _______________ responsibility.
سؤال
The ________________ model focuses on the quality of the products and services an organization provides.
سؤال
Three factors to consider in risk analysis are vulnerability, __________ and criticality.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/30
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Risk Management the Core of Private Security
1
Each component of the security system should be periodically evaluated and changes made before they are needed.
False
2
An attack tree visually represents the goal of an attack on some asset as the trunk of the tree and possible/probable ways to accomplish the attack as branches.
True
3
Alternatives for handling risk include all of the following except

A)risk elimination.
B)risk reduction.
C)risk spreading.
D)risk speculation.
D
4
Anticipating, recognizing and analyzing risks is known as

A)disaster management.
B)emergency management.
C)risk management.
D)terrorism management.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
5
The professional security manager must devote as much time to quantifying and qualifying security initiatives as any other department within an organization to justify resource allocations and expenditures.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
6
The security survey (audit) is not a critical objective, on-site analysis of the total security system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
7
The probability that something will occur uses the formula P= f/n.This formula means:

A)P=probability f=financial
N=number of times
B)P=probability f=actual occurrences of the event
N=number of circumstances
C)P=probability f=frequency
N=number
D)P=probability f=factor of ten divided by twenty
N=number of days
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which type of risk involves risk with the potential for both benefits and losses?

A)pure risk
B)dynamic risk
C)realistic risk
D)acceptable risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
9
The following guidelines provide a basic guideline to help security respond to incidents quickly and efficiently.

A)protect life and safety
B)contain the damage
C)asses the extent of damage
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
10
Qualitative risk assessment can typically start to show significant results within a few days.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
11
The security survey (audit) is a(n) __________________ analysis of the total security system.

A)critical
B)objective
C)on-site
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
12
Organizations that do not have a comprehensive risk management program in place leave themselves open to disgruntled employees and customers as well as to potential civil liability.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
13
Preventing loss through risk management always includes terrorism analysis.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which type of risk involves the potential for injury, damage or loss with no possible benefits?

A)pure risk
B)dynamic risk
C)realistic risk
D)acceptable risk
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
15
Four major types of hazards are:

A)physical, moral, typical, vulnerable
B)physical, moral, morale, critical
C)physical, moral, morale, legal
D)physical, moral, morale, on-going
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
16
A fundamental risk could be rapid inflation, natural disasters, or even war.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
17
Preventing loss through risk management includes all of the following, except

A)risk analysis.
B)media involvement.
C)policy formulation.
D)specification of a protection plan.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
18
Factors to consider in risk analysis are

A)vulnerability..
B)probability.
C)criticality.
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
19
Each component of the security system does not need to be periodically evaluated (audited) and changed as needed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
20
Strategic risk is the uncertainty regarding an organization's financial goals and objectives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
21
Risk management involves taking steps to reduce or prevent such risks and __________ the results.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
22
The number of times a risk is reasonably expected to occurring during one year is called the _________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
23
Conducting ___________ and ________________ risk assessments can give security managers a fairly comprehensive picture of an organization's security needs.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
24
The information needed for a security survey is obtained by ____________ and by talking to personnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
25
Risk management is anticipating, ____________ and ______________ risks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
26
The ______________________ focuses on the needs of the individual business, not of the business sector in general.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
27
The information needed for a security survey is obtained by _________ and by __________ to personnel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
28
Risk management is both a __________ and _______________ responsibility.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
29
The ________________ model focuses on the quality of the products and services an organization provides.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
30
Three factors to consider in risk analysis are vulnerability, __________ and criticality.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 30 في هذه المجموعة.