All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Study Help
New
Search
Search
Sign In
Register
study help
business
supervision concepts skill
Questions and Answers of
Supervision Concepts Skill
Mental disorders, financial problems, divorce, family death, or an increased interest in weapons are several indicators of a higher risk for violence. T F
All reports of violence should be taken seriously. T F
Having a violence prevention plan is the first step in providing a safer workplace.T F
Preparing for emergencies involves four important considerations: ,, and .
A particularly important component of the initial planning process is analysis.
are an important component of the training process and must be conducted after each training activity.
Emergency response training can take a variety of forms. List three types of training that can be considered: , , and .
A formal audit of the emergency response plan should be conducted how often?
The Homeland Security Act of 2002 reorganized the reporting structure of 22 government agencies, creating Department of Homeland Security. T F
Homeland Security Presidential Directive 3 authorized the establishment of the colorcoded Homeland Security Advisory System. T F
Utility companies and financial institutions are considered “critical infrastructure” by the Department of Homeland Security. T F
During the 1980s, terrorist’s tactics included actions designed to create uncertainty, fear, and international drama on which to publicize their cause. T F
Terrorist attacks have shifted from actions choreographed to obtain world-wide attention to catastrophic attacks designed to shock the populace and destroy critical infrastructure. T F
In order to prepare for emergencies, the supervisor should identify the most probable likely to occur and formulate adequate response to deal with them.
When developing the response plans, the supervisor should consult with all outside and with within their own organization.
Once an appropriate response plan has been created, a formal should be held, followed up with routine .
The supervisor should consult with outside agencies whenever possible because their and can be valuable .
During certain emergencies, the supervisor may be faced with the loss of that are normally taken for granted.
During an emergency, the security staff must handle all situations themselves. T F
The only form of communication the security supervisor will need during an emergency is two-way radios. T F
Once outside emergency personnel have arrived the security supervisor will have no other responsibilities or duties T F
During an emergency the security supervisor’s top priority is the protection of the employer’s assets. T F
The security supervisor must be able to adapt to changing situations. T F
In some cases projecting a positive image and relating well to visitors, customers, and the public at large is the sole reason for the existence of a security organization.
List the five different types of crowds:a)b)c)d)e)
List the five psychological factors of crowd formation:a)b)c)d)e)
In regards to communication at an event the security supervisor should establish a method for , , and to be able to contact each other.
Protection officers should have all their lines of communications checked for both and capabilities at the beginning of each shift.
What element is most essential during events, especially when there is an emergency?a) Positive imageb) Access controlc) Traffic controld) Force
Checking the proficiency of officers and the appearance/image of traffic control points is an essential supervisory function. T F 8.` Medical personnel (EMTs) to visitors should be a ratio of:a)
In an indoor facility what is the necessary “clear zone” around the perimeter that should be maintained for evacuation purposes?a) Three footb) Twenty footc) Hundred footd) Six foot
The type of individual hired is a key managerial aspect in a security supervisor’s job as it determines the level of performance expected. T F
First aid may be defined as the temporary care of the and injured.
The competency of all emergency medicine has come under close examination.
A person may be into medical treatment if they do not want it.
Ensure the safety at all times of the patient, public, and coworkers in the environment.
Be aware that and coworkers may also need reassurance during a crisis.
Cross-contamination of diseases such as AIDS, tuberculosis, and Hepatitis B can be prevented by the use of proper safeguarding techniques. T F
If a workman is injured with a broken arm, he is obligated to let you begin first aid because you are a security/emergency medical responder. T F
The Good Samaritan Legislation allows a person to take whatever measures necessary in order to save a person’s life. T F
Once you achieve any certification, retraining is not necessary because you will always be competent in your level of skill. T F
Confidentiality only applies to you while you work. T F
Contracting out, or outsourcing, makes good management sense when one of the following criteria is met: (select best answer)a) The client cannot perform the service for themselves due to lack of
Administrative streamlining, where the client firms only have to pay the bills and make sure they are getting the service they require, is an advantage to contracting out the security services. T F
Another form of contract security is to hire duty .
Taking courses and developing expertise in this area may add to career success in contract security.
Asset management is an integral management function that may not be properly outsourced in all circumstances. T F
It’s very difficult to remove undesirable employees in a contract situation.T F
The 4 “C” of contracting are: , , ,.
Make sure to thoroughly document all of your involving prospective contract firms being considered.
When writing the contract, you will not be able to mandate wages and benefits for contract guards. T F
In using a contract security company, you have no choice in officers.T F
error technique is used to determine if an error will be detected at a point-of-sale terminal.
analysis can be used to analyze vulnerability, better understand crime events as well as accident events. It operates by dividing into separate segments for analysis. It can also be used for
gives the designation of “Certified Fraud Examiner.”
“Rolling-ball effect” is a term used to describe cultural/group behavior in an internal theft/loss scenario. It is a synonym for “ windows” which describes a breakdown in order, vandalism,
The hiring of staff can raise the potential for internal theft. In some cases, these staff are hired by a contract firm.
about employee theft should be both verbal and written.
Donald R. authored the seminal study on embezzlement.
audits are used to determine if procedures are being followed;audits are used to uncover fiscal irregularities.
What types of crimes are common in each of the following cultures:“Work hard/play hard”“Process”“Bet your company”“Tough guy”
List the steps to be followed in a progressive discipline system moving from the least severe to most severe sanctions available to employers.
Which is NOT an example of a threat tactic?a) Stealthb) Forcec) Deceitd) Timely detection
Which of the following would cause a false alarm for an intrusion detection system?a) Rabbitb) Windc) Blowing trashd) Component failure
Deterrence contributes a measurable amount to an effective physical protection system. T F
The probability of detection for a sensor depends primarily ona) Threat to be detectedb) Sensor hardware designc) Installation conditionsd) All of the above
In a physical security system, which is NOT a threat scenario?a) Theftb) Sabotagec) Kidnappingd) Earthquake
Which of the following is a performance measure for delay barriers?a) Location of barrierb) Size of barrierc) Time to defeat barrierd) Type of barrier
Which of the following is a performance measure for a sensor?a) Probability of detectionb) Placement in the facilityc) Technology classd) Detection volume
Detection is not complete until there has been assessment of the alarm.T F
Which of the following is NOT a performance measure for a sensor?a) Probability of detectionb) Sensor applicationc) Nuisance alarm rated) Vulnerability to defeat
Which information is NOT required to define a threat?a) Class of adversary—insider, outsiders, outsiders in collusion with insidersb) Adversary tactics—deceit, force, stealth, or a combinationc)
Statistical analysis is the methods and processes used in obtaining and the methods and means for estimating their reliability.
and are the key elements in the analysis phase of information gathering.
Events are if one and only one of them takes place at a time.
The time-series method of forecasting is also called .
In forecasting, you are relying primarily on human judgment to interpret past data and make future projections.
The waiting lines or queues are a problem for a manager because the manager must balance the increased cost of more help against customer complaints.T F
Probability is the chance that something will happen.T F
Which of the following is required for proving causality?a) A correlationb) A time orderc) A nonspurious relationshipd) All of the above are requirede) Any of the three is sufficient evidence
An experimental design involves at least four groups that require careful assigning of individuals to the group most suitable for their individual needs T F
Statistical controls:a) Should be avoided because they decrease the prediction power of other variablesb) Are unnecessary in most analysesc) Help establish causality and clarify relationshipd) Are
Security Systems Integration is the of security and related systems into one overall system that is controlled by the operator and meets the needs of any situation.
Protection officers do not need to be concerned about high technology areas such as security systems integration and high technology tools that assist the protection officer.T F
A is a device that can perform complex computations, gather data, provide information in picture form, and control various systems.
Computers have many applications in security operations. T F
is a method that controls the flow of traffic through the access points and areas of a protected facility.
The key element of access control is identification. T F
A consists of a camera, monitor, transmission medium, control equipment, and recording devices.
Proximity-based electronic access control systems are inefficient, ineffective, and are the least used access control system. T F
The concept of having security responsible for nonsecurity systems is called .
Closed circuit television systems are among the most effective high technology tools for protection officers. T F
Identity theft and the loss of proprietary information can result if high-technology assets are not properly protected. T F
Trends in high-technology that can contribute to security risks include all of the following, except A) Smaller sizes B) Decreased storage capacities C) Increasing convertibility D) Growing prevalence
The most effective protection plan includes A) A segmented approach B) A high-technology approach C) Sophisticated biometrics D) A layered approach
A lost asset can result in A) Increased insurance premiums B) Lost business C) Damaged reputation D) All of the above
High-technology products are increasingly convertible. This means that A) They can quickly and easily be turned into cash B) They are multipurpose C) They can be easily concealed D) Their value is
High-technology thieves can be motivated by A) The potential for identity theft B) Valuable proprietary information C) The promise of quick cash D) All of the above
The Internet is often used to convert stolen technology assets into cash. T F
This technology uses electronic tags to help manage and track assets:(Radio Frequency Identification) RFID
Showing 1300 - 1400
of 2242
First
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
Last