Deck 1: ASIS Certified Protection Professional

Full screen (f)
exit full mode
Question
If it is necessary to terminate an undercover investigation, one of the following actions should not be done:

A) Withdraw agent safely
B) Withdraw agent immediately
C) Salvage as much of the resultant data as possible
D) Prepare explanations for those who demand them
E) Reveal the agent's identity
Use Space or
up arrow
down arrow
to flip the card.
Question
Questions on an application blank or field investigative inquiries that deal with a union membership or affiliation should be avoided as they may lead to charges that constitute violations of:

A) The National Labor Relations Act
B) The Civil Rights Act of 1964
C) The Civil Rights Act of 1976
D) The Fair Credit Reporting Act
E) The Federal Tort Claims Act
Question
One of the following is not prohibited by the Federal Civil Rights Act during an investigation:

A) Asking questions about prior arrests
B) Asking questions about prior convictions
C) Directing inquiry into areas of race or color for discriminatory purposes
D) Directing inquiry into areas of religion or sex for discriminatory purposes
E) None of the above
Question
One whose sexual desires are directed to both men and women is known as a:

A) Lesbian
B) Bisexual
C) Homosexual
D) Transvestite
E) None of the above
Question
A narcotic addict is sometimes called:

A) A bingo
B) A geezer
C) A hophead
D) A pop
E) A bagman
Question
Which of the following is not a requirement for a successful undercover investigation?

A) A qualified investigator
B) A plausible cover story
C) An effective control scheme
D) Developing necessary evidence for prosecution
E) A reliable method to discontinue or even suddenly abort the investigation
Question
A yellow-colored crystalline solid pertains to the following explosive:

A) TNT
B) Dynamite
C) Nitroglycerin
D) Mercury fulminate
E) Picric acid
Question
One of the following is not one of the desired characteristics of a statement obtained during a claim investigation:

A) It should be written in ink or indelible pencil, or typed.
B) It must be dated.
C) It should be in short paragraphs with two spaces between each paragraph.
D) It may be signed or unsigned.
E) It must contain the identification of the person making it.
Question
A craving for a drug is exhibited often by the following:

A) Water running from nose or eyes
B) Frequent yawning or sneezing
C) Continual itching of arms and legs
D) All of the above
E) None of the above
Question
The rule that states that approximately one in ten applications will have major omissions, which will require going back to the applicant, is called:

A) The Rule of Ten
B) The Rule of Nine
C) The 1-10 Rule
D) The Verification Rule
E) Sullivan's Rule
Question
Which of the following could be considered a source of information?

A) A record
B) A custodian of record
C) A public official
D) All of the above
E) None of the above
Question
In conducting interviews during an investigation concerning "financial lifestyle," the investigator should more appropriately tell the person being interviewed that the employee is:

A) Being considered for a position B. Suspected of wrongdoing
B) Being interviewed in connection with a position of trust
C) Being considered for a promotion
D) None of the above: tell the interviewee nothing
Question
If the interviewee during an investigation is hostile, it is preferable to conduct the interview at:

A) The security office
B) The home of the interviewee
C) A neutral spot
D) In an automobile
E) At the office of the interviewee's lawyer
Question
One of the following is not considered an element of the common law crime of arson:

A) Commercial building
B) Maliciousness
C) Burning
D) Willfulness
E) Of another
Question
Who of the following should be interviewed last or near the end of an investigation under usual circumstances?

A) Those with extensive information
B) Those preparing to take a trip out of the area
C) Those likely to be hostile
D) Those with less than extensive information
E) Those only in the area temporarily
Question
Which of the following is not a high explosive?

A) Nitrocellulose
B) Nitroglycerin
C) Dynamite
D) Nitro starch
E) Picric acid
Question
As a general rule the number of consecutive years of employment or nonemployment to be verified preceding the date of investigation is:

A) 5 years
B) 7 years
C) 3 years
D) 2 years
E) 10 years
Question
The investigation's best approach to questioning relies on the following:

A) Most suspects will lie or circumvent the truth.
B) A suspect is innocent until proven guilty.
C) A key suspect is guilty and evidence must be found.
D) A signed statement in the form of a confession must be obtained.
E) None of the above.
Question
In conducting gambling investigations, the security officer should:

A) Cooperate with local, county, state, or federal law enforcement
B) Not use undercover operatives
C) Wiretap the employee's home phone
D) Search the lockers of all suspects
E) None of the above
Question
Which of the following is not a legitimate purpose of an investigation for employee misconduct?

A) To determine whether company rules have been violated
B) To ascertain whether company policies have been violated
C) To catalog information about employees that might be derogatory for future use
D) To determine if state laws have been violated
E) To determine if federal laws have been violated
Question
It is becoming increasingly more difficult to do a good preemployment background investigation because of:

A) The expense
B) The lack of skilled investigators
C) Various rulings and court decisions that inhibit the use of techniques or instruments available
D) The uncooperative attitudes of persons interviewed
E) Such investigations are illegal in a number of states
Question
The witness's idea of the suspect, described in words, is called:

A) Portrait parle
B) Modus operandi
C) Corpus delecti
D) All of the above
E) None of the above
Question
Which of the following characteristics relate to the psychological stress analyzer?

A) No physical connection with the body is required.
B) The subject is not required to answer in a terse "yes" or "no" format.
C) It can be used covertly.
D) All of the above.
E) None of the above.
Question
Of all those with mental disorders, the most dangerous subject to handle is:

A) One suffering hysteria
B) A paranoid psychotic
C) A neurotic
D) One suffering phobia
E) Schizophrenic
Question
A device used to detect deception through stress recorded by voice modulations is known as (a):

A) Polygraph
B) Lie detector
C) Psychological stress analyzer
D) Truth serum
E) Hypnotism
Question
The most widely recognized and best-known instrument designed to detect deception is:

A) Fingerprint classifier
B) Voice analyzer
C) Polygraph
D) Truth serum
E) Stress analyzer
Question
Identify the Act that basically prohibits discrimination, discharge, failure or refusal to hire, etc., on any of the grounds of race, color, religion, sex, or national origin:

A) The Fair Credit Reporting Act
B) The Civil Rights Act of 1964
C) The First Amendment
D) The Omnibus Crime Control Act
E) None of the above
Question
The effectiveness of the voice analyzer in accurately detecting deception is:

A) 100 percent
B) 96 percent
C) 94 percent
D) 85 percent
E) Not determined
Question
The person best suited for physical surveillance work is one who:

A) Is tall enough to see over crowds
B) Will blend into the area
C) Has a college education
D) Has a background of police work
E) None of the above
Question
The most important factor in the use of a polygraph is:

A) The examiner
B) The make of the instrument
C) Environmental factors
D) The time of day
E) The types of questions
Question
The pre-testing interview prior to the polygraph examination itself is for the purpose of:

A) Helping the subject to relax
B) Helping the examiner to get to know the subject
C) Helping the examiner to judge the subject's character
D) All of the above
E) None of the above
Question
Identification and access control systems have the widest application of:

A) Manual identification systems
B) Magnetic readers
C) Biometric-based systems
D) Dielectric readers
E) None of the above
Question
The main function of the private security agent is to:

A) Locate stolen goods
B) Ascertain and report illegal activities
C) Receive well-rounded investigative experience
D) Ascertain the state of morale
E) None of the above
Question
Which of the following statements is not correct regarding the polygraph?

A) The polygraph is not a lie detector.
B) The polygraph does not automatically register truth or falsehood.
C) A polygraph test is conclusive.
D) Historically, polygraphs have more often been used to establish innocence rather than to prove guilt.
E) None of the above.
Question
The U.S. Army trains its polygraph operators as well as those from other U.S. agencies at:

A) West Point, New York
B) Washington, D.C.
C) Fort Gordon, Georgia
D) Fort Leavenworth, Kansas
E) Fort Meade, Maryland
Question
In situations in which at least one party to a communication is aware and willing that the recording of his or her conversation with another person or persons is being made, it is:

A) A violation of the Omnibus Crime Control Act
B) A violation of the Federal Communications Act
C) Not a violation
D) Allowed by the Federal Anti-Racketeering Statute
E) Allowed by 18 USC 2511
Question
Under court interpretations of the Civil Rights Act of 1964, which of the following are not allowed during investigations?

A) Questions regarding prior arrests
B) Questions regarding prior convictions
C) Questions regarding age
D) Questions regarding residence
E) Questions regarding prior employment
Question
In handling a mentally disturbed person, one should:

A) Take a strong position as the boss
B) Assume a calm and friendly position
C) Leave the impression he or she has control of the situation
D) All of the above
E) None of the above
Question
On average, a polygraph examination takes:

A) 10 hours
B) 1 hour
C) 15 minutes
D) 5 hours I
E) 4 hours
Question
Interviews should be conducted:

A) In the company of the suspect's attorney
B) In an area where distractions are minimal
C) In a comfortable room that is well furnished like home
D) In an area where the light is focused on the suspect's face
E) None of the above
Question
Which of the following is generally not true in regard to trade secrets?

A) The more a business narrowly defines what it regards as a secret, the easier it is to protect that body of information.
B) It is difficult to protect a trade secret that can be found in publicly accessible sources.
C) Secret information does have to be specifically identifiable.
D) Secret information must be effectively protected.
E) None of the above.
Question
Which of the following would not be considered in the "trade secret" category?

A) Salary data
B) Market surveys
C) Personnel matters
D) Customer usage evaluations
E) All of the above
Question
Which of the following applies to the laser as a means of communication?

A) Line of sight transmission is necessary.
B) Poor weather conditions interfere with the beam.
C) It is practically impossible to intercept the beam without detection.
D) Both A and C.
E) All of the above.
Question
What is most likely the main reason for loss of sensitive information?

A) Industrial espionage
B) An employee's loose lips
C) Inadvertent disclosure
D) Deliberate theft by an outsider
E) Both B and C
F) None of the above
Question
A general defect of manual identification systems is that:

A) Many are made of plastic.
B) Many do not have biometric characteristics on them.
C) Once issued, they tend to remain valid indefinitely.
D) They lack identifying colors.
E) None of the above.
Question
Proprietary information is:

A) Private information of a highly sensitive nature
B) Information that must be classified according to executive order of the U.S. Government
C) Sensitive information that is classified according to executive order of the U.S. Government
D) Anything that an enterprise considers relevant to its status or opera
Question
Which of the following is generally not allowed to be disclosed on an employment questionnaire?

A) Current residence
B) References
C) Prior employment
D) Prior arrests
E) None of the above
Question
Electromagnetic radiation is detectable electromagnetic energy that is generated by electronic information processing devices. Which' of the following is used to protect very sensitive equipment?

A) A current carrier device
B) Pneumatic cavity shielding
C) Tempest shielding
D) Pen register shielding
Question
The process of combining a number of transmission into one composite signal to be sent over one link is called:

A) Transmission integrity
B) Communication integration
C) A demultiplexer
D) Multiplexing
E) None of the above
Question
Sound waves too high in frequency to be heard by the human ear, generally above 20 kHz, are known as:

A) High-frequency sound waves
B) Microwave waves
C) Ultrasonic waves
D) Short-frequency sound waves
E) None of the above
Question
According to the "restatement of the law of torts," a trade secret is:

A) All information about a company that the company desires to protect
B) Any formula, pattern, device, or compilation of information that is used in one's business and that gives that business an opportunity to gain an advantage over competitors who do not know or use it
C) Information about a company that is registered with the U.S. Patent Office
D) Both A and B
E) All of the above
Question
A trade secret may be:

A) A formula for a chemical compound
B) A process of manufacturing materials
C) A pattern for a machine
D) A list of customers
E) All of the above
Question
The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed:

A) Bugging
B) Veiling
C) Tempest
D) All of the above
E) None of the above
Question
It is important for employees to know whether confidential information is a trade secret, or some other confidential material, because:

A) If it is a trade secret, the employee may be prevented from disclosing t by injunction.
B) If not a trade secret and it is disclosed, the employer must take action after the disclosure and must be able to prove some actual damage in order to recover
C) If not a trade secret, the information once disclosed is no longer defendable
D) If not a trade secret, the information once disclosed cannot be further prevented from disclosure by an injunction
E) All of the above.
Question
Which of the following is not a correct statement as a general rule involving the protection of proprietary information?

A) As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
B) By operation of common law, employees are presumed to be fiduciaries to an extent that they may not disclose secrets of their employers without authorization
C) Other than the employees, any other persons to be bound to secrecy must agree to be so bound
D) Any agreements to be bound must always be in writing and are not implied from acts
Question
Any formula, pattern, device, or compilation of information that is used in one's business and that gives you an opportunity to gain an advantage over competitors who do not use it or know about it is:

A) A patent
B) A trade secret
C) A monopoly
D) Copyrighted material
E) None of the above
Question
Which of the following should be part of an effective information security program?

A) Pre-employment screening
B) Nondisclosure agreements from employees
C) Employee awareness programs
D) Policy and procedural statements on the recognition, classification, and handling of sensitive information
E) All of the above
Question
When a loss of proprietary information is discovered, which of the following steps should be taken first?

A) Attempt to recover the material.
B) Attempt to apprehend the perpetrators.
C) Assess economic damage.
D) Re-evaluate the protection system.
E) All of the above.
Question
The class of person under a duty to safeguard a proprietary secret is known as a(n):

A) Agent
B) Proprietary security employee
C) Fiduciary
D) Business associate
E) None of the above
Question
To effectively involve the law for the protection of sensitive information, the owner of the proprietary information must be able to show "objective indications of attempts to protect secrecy." Which of the following has been recognized in the past as such an indication?

A) Use of warning signs to alert employees to sensitive data and the places it is stored
B) Separately storing sensitive information in security containers with the appropriate security precautions
C) Special instructions providing a "need-to-know" basis
D) Restrictions to nonemployee access to places containing sensitive information
E) All of the above
Question
Which of the following statements is not true in regard to an information security program?

A) The information security program is an attempt to make theft of sensitive information difficult, not necessarily to eliminate it.
B) The protection afforded against losses by either internal or external sources is, at best, limited.
C) A good information security program will provide total protection from industrial espionage.
D) A trust relationship must be established and maintained with employees.
E) The good will and compliance of employees is crucial for success.
Question
Which of the following characteristics pertains to a good information management program?

A) An employee education program for those who utilize the classification system
B) Limited number of individuals who can initiate classification of information
C) Limitation of the duration during which the classification will remain in effect
D) All of the above
E) None of the above
Question
A microphone with a disklike attachment that is used for listening to audio from great distances is known as a(n):

A) Contact microphone
B) Parabolic microphone
C) Ultrasonic microphone
D) Both A and C
E) None of the above
Question
Which of the following would not be permitted to review a student's record according to the Family Educational Rights and the Privacy Act of 1974?

A) Law enforcement officials
B) Other school officials
C) The school's registrar office
D) All of the above
E) None of the above
Question
Installation of a wireless radio eavesdropping device usually consists of the following:

A) Transmitter and receiver
B) Power supply
C) Antenna
D) Microphone
E) Both A and D
F) All of the above
Question
Vital records normally constitute what percentage of the company's total records?

A) 2 percent
B) 5 percent
C) 10 percent
D) 15 percent
E) 20 percent
Question
The most secure scrambler in common use is the:

A) Frequency inverter
B) Decoder
C) Laser beam
D) Vocoder
E) None of the above
Question
The Secretary of Defense is not authorized to act on behalf of the following agency or department in rendering industrial security services:

A) Department of Commerce
B) Central Intelligence Agency
C) Department of Justice
D) Department of Labor
E) None of the above
Question
A microphone that requires no power source, is very small, and is difficult to detect has the characteristics of a(n):

A) Contact microphone
B) Parabolic microphone
C) Dynamic microphone
D) Infinity microphone
E) None of the above
Question
The elements of an information security program include:

A) Informing employees that the information is to be protected
B) Establishing the use of patent or nondisclosure agreements
C) Designation of certain information as sensitive
D) Providing the means for employees to protect sensitive information
E) All of the above
Question
A specially constructed microphone attached directly to an object or surface to be protected, which responds only when the protected object or surface is disturbed, is known as:

A) Parabolic microphone
B) Special audio microphone
C) Contact microphone
D) Surreptitious microphone
E) None of the above
Question
The frequency range best suited for a wireless microphone because it provides better security and lower interference is:

A) 25-50 mHz
B) 88-104 mHz
C) 88-120 mHz
D) 150-174 mHz
E) None of the above
Question
The manufacture, distribution, possession, and advertising of wire or oral communication interception devices is prohibited by:

A) The First Amendment
B) The Fourth Amendment
C) The Federal Communications Act of 1934
D) The Omnibus Crime Control and Safe Streets Act of 1968
E) The FBI
Question
A small hidden microphone and a radio transmitter are generally known as:

A) A wiretap
B) A bug
C) A beeper
D) Electronic surveillance
E) All of the above
Question
The first federal legislation that attempted to regulate electronic surveillance in the United States was enacted by Congress in:

A) 1910
B) 1924
C) 1934
D) 1968
E) 1971
Question
The term "eavesdropping" refers to:

A) Wiretapping
B) Bugging
C) Trash cover
D) Both A and C
E) All of the above
Question
The term "social engineering" is:

A) A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity
B) The subtle elicitation of information without revealing the true purpose of the call
C) The specific design of a business structure to facilitate the interaction of the inhabitants
D) Both A and C
E) None of the above
Question
Which of the following methods could be used as a form of eavesdropping using a telephone instrument?

A) Wiring can be altered so the handset or receiver will act as an open microphone.
B) A radio transmitter can be concealed in the mouthpiece.
C) The infinity transmitter can be used.
D) Both B and C.
E) All of the above.
Question
Competitive intelligence gathering is a legitimate activity that is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:

A) Alert senior management to changes in protocol in foreign countries
B) Alert senior management as to the personal habits of competitive
C) senior management
D) Alert government intelligence agencies to marketplace changes
E) Alert senior management to marketplace changes in order to prevent surprise
F) All of the above
Question
The Privacy Act of 1974 provides which of the following safeguards?

A) Permits individuals to gain access to certain information pertaining to themselves in federal agency records
B) Permits individuals to determine what records pertaining to themselves are collected and maintained by federal agencies
C) Permits individuals to prevent certain records pertaining to themselves from being used or made available for another purpose without their consent
D) Requires federal agencies to be subject to civil suits for any damages that may occur as a result of willful or intentional action that violates an individual's rights under the Privacy Act of 1974
E) All of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/728
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: ASIS Certified Protection Professional
1
If it is necessary to terminate an undercover investigation, one of the following actions should not be done:

A) Withdraw agent safely
B) Withdraw agent immediately
C) Salvage as much of the resultant data as possible
D) Prepare explanations for those who demand them
E) Reveal the agent's identity
E
2
Questions on an application blank or field investigative inquiries that deal with a union membership or affiliation should be avoided as they may lead to charges that constitute violations of:

A) The National Labor Relations Act
B) The Civil Rights Act of 1964
C) The Civil Rights Act of 1976
D) The Fair Credit Reporting Act
E) The Federal Tort Claims Act
A
3
One of the following is not prohibited by the Federal Civil Rights Act during an investigation:

A) Asking questions about prior arrests
B) Asking questions about prior convictions
C) Directing inquiry into areas of race or color for discriminatory purposes
D) Directing inquiry into areas of religion or sex for discriminatory purposes
E) None of the above
B
4
One whose sexual desires are directed to both men and women is known as a:

A) Lesbian
B) Bisexual
C) Homosexual
D) Transvestite
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
5
A narcotic addict is sometimes called:

A) A bingo
B) A geezer
C) A hophead
D) A pop
E) A bagman
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is not a requirement for a successful undercover investigation?

A) A qualified investigator
B) A plausible cover story
C) An effective control scheme
D) Developing necessary evidence for prosecution
E) A reliable method to discontinue or even suddenly abort the investigation
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
7
A yellow-colored crystalline solid pertains to the following explosive:

A) TNT
B) Dynamite
C) Nitroglycerin
D) Mercury fulminate
E) Picric acid
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
8
One of the following is not one of the desired characteristics of a statement obtained during a claim investigation:

A) It should be written in ink or indelible pencil, or typed.
B) It must be dated.
C) It should be in short paragraphs with two spaces between each paragraph.
D) It may be signed or unsigned.
E) It must contain the identification of the person making it.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
9
A craving for a drug is exhibited often by the following:

A) Water running from nose or eyes
B) Frequent yawning or sneezing
C) Continual itching of arms and legs
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
10
The rule that states that approximately one in ten applications will have major omissions, which will require going back to the applicant, is called:

A) The Rule of Ten
B) The Rule of Nine
C) The 1-10 Rule
D) The Verification Rule
E) Sullivan's Rule
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following could be considered a source of information?

A) A record
B) A custodian of record
C) A public official
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
12
In conducting interviews during an investigation concerning "financial lifestyle," the investigator should more appropriately tell the person being interviewed that the employee is:

A) Being considered for a position B. Suspected of wrongdoing
B) Being interviewed in connection with a position of trust
C) Being considered for a promotion
D) None of the above: tell the interviewee nothing
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
13
If the interviewee during an investigation is hostile, it is preferable to conduct the interview at:

A) The security office
B) The home of the interviewee
C) A neutral spot
D) In an automobile
E) At the office of the interviewee's lawyer
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
14
One of the following is not considered an element of the common law crime of arson:

A) Commercial building
B) Maliciousness
C) Burning
D) Willfulness
E) Of another
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
15
Who of the following should be interviewed last or near the end of an investigation under usual circumstances?

A) Those with extensive information
B) Those preparing to take a trip out of the area
C) Those likely to be hostile
D) Those with less than extensive information
E) Those only in the area temporarily
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is not a high explosive?

A) Nitrocellulose
B) Nitroglycerin
C) Dynamite
D) Nitro starch
E) Picric acid
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
17
As a general rule the number of consecutive years of employment or nonemployment to be verified preceding the date of investigation is:

A) 5 years
B) 7 years
C) 3 years
D) 2 years
E) 10 years
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
18
The investigation's best approach to questioning relies on the following:

A) Most suspects will lie or circumvent the truth.
B) A suspect is innocent until proven guilty.
C) A key suspect is guilty and evidence must be found.
D) A signed statement in the form of a confession must be obtained.
E) None of the above.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
19
In conducting gambling investigations, the security officer should:

A) Cooperate with local, county, state, or federal law enforcement
B) Not use undercover operatives
C) Wiretap the employee's home phone
D) Search the lockers of all suspects
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is not a legitimate purpose of an investigation for employee misconduct?

A) To determine whether company rules have been violated
B) To ascertain whether company policies have been violated
C) To catalog information about employees that might be derogatory for future use
D) To determine if state laws have been violated
E) To determine if federal laws have been violated
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
21
It is becoming increasingly more difficult to do a good preemployment background investigation because of:

A) The expense
B) The lack of skilled investigators
C) Various rulings and court decisions that inhibit the use of techniques or instruments available
D) The uncooperative attitudes of persons interviewed
E) Such investigations are illegal in a number of states
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
22
The witness's idea of the suspect, described in words, is called:

A) Portrait parle
B) Modus operandi
C) Corpus delecti
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following characteristics relate to the psychological stress analyzer?

A) No physical connection with the body is required.
B) The subject is not required to answer in a terse "yes" or "no" format.
C) It can be used covertly.
D) All of the above.
E) None of the above.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
24
Of all those with mental disorders, the most dangerous subject to handle is:

A) One suffering hysteria
B) A paranoid psychotic
C) A neurotic
D) One suffering phobia
E) Schizophrenic
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
25
A device used to detect deception through stress recorded by voice modulations is known as (a):

A) Polygraph
B) Lie detector
C) Psychological stress analyzer
D) Truth serum
E) Hypnotism
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
26
The most widely recognized and best-known instrument designed to detect deception is:

A) Fingerprint classifier
B) Voice analyzer
C) Polygraph
D) Truth serum
E) Stress analyzer
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
27
Identify the Act that basically prohibits discrimination, discharge, failure or refusal to hire, etc., on any of the grounds of race, color, religion, sex, or national origin:

A) The Fair Credit Reporting Act
B) The Civil Rights Act of 1964
C) The First Amendment
D) The Omnibus Crime Control Act
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
28
The effectiveness of the voice analyzer in accurately detecting deception is:

A) 100 percent
B) 96 percent
C) 94 percent
D) 85 percent
E) Not determined
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
29
The person best suited for physical surveillance work is one who:

A) Is tall enough to see over crowds
B) Will blend into the area
C) Has a college education
D) Has a background of police work
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
30
The most important factor in the use of a polygraph is:

A) The examiner
B) The make of the instrument
C) Environmental factors
D) The time of day
E) The types of questions
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
31
The pre-testing interview prior to the polygraph examination itself is for the purpose of:

A) Helping the subject to relax
B) Helping the examiner to get to know the subject
C) Helping the examiner to judge the subject's character
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
32
Identification and access control systems have the widest application of:

A) Manual identification systems
B) Magnetic readers
C) Biometric-based systems
D) Dielectric readers
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
33
The main function of the private security agent is to:

A) Locate stolen goods
B) Ascertain and report illegal activities
C) Receive well-rounded investigative experience
D) Ascertain the state of morale
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
34
Which of the following statements is not correct regarding the polygraph?

A) The polygraph is not a lie detector.
B) The polygraph does not automatically register truth or falsehood.
C) A polygraph test is conclusive.
D) Historically, polygraphs have more often been used to establish innocence rather than to prove guilt.
E) None of the above.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
35
The U.S. Army trains its polygraph operators as well as those from other U.S. agencies at:

A) West Point, New York
B) Washington, D.C.
C) Fort Gordon, Georgia
D) Fort Leavenworth, Kansas
E) Fort Meade, Maryland
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
36
In situations in which at least one party to a communication is aware and willing that the recording of his or her conversation with another person or persons is being made, it is:

A) A violation of the Omnibus Crime Control Act
B) A violation of the Federal Communications Act
C) Not a violation
D) Allowed by the Federal Anti-Racketeering Statute
E) Allowed by 18 USC 2511
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
37
Under court interpretations of the Civil Rights Act of 1964, which of the following are not allowed during investigations?

A) Questions regarding prior arrests
B) Questions regarding prior convictions
C) Questions regarding age
D) Questions regarding residence
E) Questions regarding prior employment
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
38
In handling a mentally disturbed person, one should:

A) Take a strong position as the boss
B) Assume a calm and friendly position
C) Leave the impression he or she has control of the situation
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
39
On average, a polygraph examination takes:

A) 10 hours
B) 1 hour
C) 15 minutes
D) 5 hours I
E) 4 hours
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
40
Interviews should be conducted:

A) In the company of the suspect's attorney
B) In an area where distractions are minimal
C) In a comfortable room that is well furnished like home
D) In an area where the light is focused on the suspect's face
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
41
Which of the following is generally not true in regard to trade secrets?

A) The more a business narrowly defines what it regards as a secret, the easier it is to protect that body of information.
B) It is difficult to protect a trade secret that can be found in publicly accessible sources.
C) Secret information does have to be specifically identifiable.
D) Secret information must be effectively protected.
E) None of the above.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
42
Which of the following would not be considered in the "trade secret" category?

A) Salary data
B) Market surveys
C) Personnel matters
D) Customer usage evaluations
E) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
43
Which of the following applies to the laser as a means of communication?

A) Line of sight transmission is necessary.
B) Poor weather conditions interfere with the beam.
C) It is practically impossible to intercept the beam without detection.
D) Both A and C.
E) All of the above.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
44
What is most likely the main reason for loss of sensitive information?

A) Industrial espionage
B) An employee's loose lips
C) Inadvertent disclosure
D) Deliberate theft by an outsider
E) Both B and C
F) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
45
A general defect of manual identification systems is that:

A) Many are made of plastic.
B) Many do not have biometric characteristics on them.
C) Once issued, they tend to remain valid indefinitely.
D) They lack identifying colors.
E) None of the above.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
46
Proprietary information is:

A) Private information of a highly sensitive nature
B) Information that must be classified according to executive order of the U.S. Government
C) Sensitive information that is classified according to executive order of the U.S. Government
D) Anything that an enterprise considers relevant to its status or opera
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following is generally not allowed to be disclosed on an employment questionnaire?

A) Current residence
B) References
C) Prior employment
D) Prior arrests
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
48
Electromagnetic radiation is detectable electromagnetic energy that is generated by electronic information processing devices. Which' of the following is used to protect very sensitive equipment?

A) A current carrier device
B) Pneumatic cavity shielding
C) Tempest shielding
D) Pen register shielding
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
49
The process of combining a number of transmission into one composite signal to be sent over one link is called:

A) Transmission integrity
B) Communication integration
C) A demultiplexer
D) Multiplexing
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
50
Sound waves too high in frequency to be heard by the human ear, generally above 20 kHz, are known as:

A) High-frequency sound waves
B) Microwave waves
C) Ultrasonic waves
D) Short-frequency sound waves
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
51
According to the "restatement of the law of torts," a trade secret is:

A) All information about a company that the company desires to protect
B) Any formula, pattern, device, or compilation of information that is used in one's business and that gives that business an opportunity to gain an advantage over competitors who do not know or use it
C) Information about a company that is registered with the U.S. Patent Office
D) Both A and B
E) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
52
A trade secret may be:

A) A formula for a chemical compound
B) A process of manufacturing materials
C) A pattern for a machine
D) A list of customers
E) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
53
The practice of preventing unauthorized persons from gaining information by analyzing electromagnetic emanations from electronic equipment is often termed:

A) Bugging
B) Veiling
C) Tempest
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
54
It is important for employees to know whether confidential information is a trade secret, or some other confidential material, because:

A) If it is a trade secret, the employee may be prevented from disclosing t by injunction.
B) If not a trade secret and it is disclosed, the employer must take action after the disclosure and must be able to prove some actual damage in order to recover
C) If not a trade secret, the information once disclosed is no longer defendable
D) If not a trade secret, the information once disclosed cannot be further prevented from disclosure by an injunction
E) All of the above.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following is not a correct statement as a general rule involving the protection of proprietary information?

A) As a class, employees are the largest group of persons bound to secrecy because of their status or relationship
B) By operation of common law, employees are presumed to be fiduciaries to an extent that they may not disclose secrets of their employers without authorization
C) Other than the employees, any other persons to be bound to secrecy must agree to be so bound
D) Any agreements to be bound must always be in writing and are not implied from acts
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
56
Any formula, pattern, device, or compilation of information that is used in one's business and that gives you an opportunity to gain an advantage over competitors who do not use it or know about it is:

A) A patent
B) A trade secret
C) A monopoly
D) Copyrighted material
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
57
Which of the following should be part of an effective information security program?

A) Pre-employment screening
B) Nondisclosure agreements from employees
C) Employee awareness programs
D) Policy and procedural statements on the recognition, classification, and handling of sensitive information
E) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
58
When a loss of proprietary information is discovered, which of the following steps should be taken first?

A) Attempt to recover the material.
B) Attempt to apprehend the perpetrators.
C) Assess economic damage.
D) Re-evaluate the protection system.
E) All of the above.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
59
The class of person under a duty to safeguard a proprietary secret is known as a(n):

A) Agent
B) Proprietary security employee
C) Fiduciary
D) Business associate
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
60
To effectively involve the law for the protection of sensitive information, the owner of the proprietary information must be able to show "objective indications of attempts to protect secrecy." Which of the following has been recognized in the past as such an indication?

A) Use of warning signs to alert employees to sensitive data and the places it is stored
B) Separately storing sensitive information in security containers with the appropriate security precautions
C) Special instructions providing a "need-to-know" basis
D) Restrictions to nonemployee access to places containing sensitive information
E) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
61
Which of the following statements is not true in regard to an information security program?

A) The information security program is an attempt to make theft of sensitive information difficult, not necessarily to eliminate it.
B) The protection afforded against losses by either internal or external sources is, at best, limited.
C) A good information security program will provide total protection from industrial espionage.
D) A trust relationship must be established and maintained with employees.
E) The good will and compliance of employees is crucial for success.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following characteristics pertains to a good information management program?

A) An employee education program for those who utilize the classification system
B) Limited number of individuals who can initiate classification of information
C) Limitation of the duration during which the classification will remain in effect
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
63
A microphone with a disklike attachment that is used for listening to audio from great distances is known as a(n):

A) Contact microphone
B) Parabolic microphone
C) Ultrasonic microphone
D) Both A and C
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
64
Which of the following would not be permitted to review a student's record according to the Family Educational Rights and the Privacy Act of 1974?

A) Law enforcement officials
B) Other school officials
C) The school's registrar office
D) All of the above
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
65
Installation of a wireless radio eavesdropping device usually consists of the following:

A) Transmitter and receiver
B) Power supply
C) Antenna
D) Microphone
E) Both A and D
F) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
66
Vital records normally constitute what percentage of the company's total records?

A) 2 percent
B) 5 percent
C) 10 percent
D) 15 percent
E) 20 percent
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
67
The most secure scrambler in common use is the:

A) Frequency inverter
B) Decoder
C) Laser beam
D) Vocoder
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
68
The Secretary of Defense is not authorized to act on behalf of the following agency or department in rendering industrial security services:

A) Department of Commerce
B) Central Intelligence Agency
C) Department of Justice
D) Department of Labor
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
69
A microphone that requires no power source, is very small, and is difficult to detect has the characteristics of a(n):

A) Contact microphone
B) Parabolic microphone
C) Dynamic microphone
D) Infinity microphone
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
70
The elements of an information security program include:

A) Informing employees that the information is to be protected
B) Establishing the use of patent or nondisclosure agreements
C) Designation of certain information as sensitive
D) Providing the means for employees to protect sensitive information
E) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
71
A specially constructed microphone attached directly to an object or surface to be protected, which responds only when the protected object or surface is disturbed, is known as:

A) Parabolic microphone
B) Special audio microphone
C) Contact microphone
D) Surreptitious microphone
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
72
The frequency range best suited for a wireless microphone because it provides better security and lower interference is:

A) 25-50 mHz
B) 88-104 mHz
C) 88-120 mHz
D) 150-174 mHz
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
73
The manufacture, distribution, possession, and advertising of wire or oral communication interception devices is prohibited by:

A) The First Amendment
B) The Fourth Amendment
C) The Federal Communications Act of 1934
D) The Omnibus Crime Control and Safe Streets Act of 1968
E) The FBI
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
74
A small hidden microphone and a radio transmitter are generally known as:

A) A wiretap
B) A bug
C) A beeper
D) Electronic surveillance
E) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
75
The first federal legislation that attempted to regulate electronic surveillance in the United States was enacted by Congress in:

A) 1910
B) 1924
C) 1934
D) 1968
E) 1971
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
76
The term "eavesdropping" refers to:

A) Wiretapping
B) Bugging
C) Trash cover
D) Both A and C
E) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
77
The term "social engineering" is:

A) A function of the personnel department in which like persons are teamed together in workshops or seminars for maximum productivity
B) The subtle elicitation of information without revealing the true purpose of the call
C) The specific design of a business structure to facilitate the interaction of the inhabitants
D) Both A and C
E) None of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
78
Which of the following methods could be used as a form of eavesdropping using a telephone instrument?

A) Wiring can be altered so the handset or receiver will act as an open microphone.
B) A radio transmitter can be concealed in the mouthpiece.
C) The infinity transmitter can be used.
D) Both B and C.
E) All of the above.
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
79
Competitive intelligence gathering is a legitimate activity that is engaged in by many firms throughout the world. The most important function of competitive intelligence is to:

A) Alert senior management to changes in protocol in foreign countries
B) Alert senior management as to the personal habits of competitive
C) senior management
D) Alert government intelligence agencies to marketplace changes
E) Alert senior management to marketplace changes in order to prevent surprise
F) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
80
The Privacy Act of 1974 provides which of the following safeguards?

A) Permits individuals to gain access to certain information pertaining to themselves in federal agency records
B) Permits individuals to determine what records pertaining to themselves are collected and maintained by federal agencies
C) Permits individuals to prevent certain records pertaining to themselves from being used or made available for another purpose without their consent
D) Requires federal agencies to be subject to civil suits for any damages that may occur as a result of willful or intentional action that violates an individual's rights under the Privacy Act of 1974
E) All of the above
Unlock Deck
Unlock for access to all 728 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 728 flashcards in this deck.