暗記メーカー
ログイン
LEA LONGQUIZ
  • sean loretz cahayag

  • 問題数 47 • 4/3/2024

    記憶度

    完璧

    7

    覚えた

    18

    うろ覚え

    0

    苦手

    0

    未解答

    0

    アカウント登録して、解答結果を保存しよう

    問題一覧

  • 1

    is the protection of the company assets against loss of life and damage to property. Its main concern is the security and safety of each people and organization.

    Personnel security

  • 2

    is a process of inquiry into the character reputation, discretion , integrity , morals and loyalty of an individual to determine the suitability for appointment or access to classified matter.

    Personnel security investigation

  • 3

    Personnel security investigation has three general techniques

    Background investigation positivity vetting profiling

  • 4

    this technique is very expensive but necessary is personal security . It serves to verify information on the application form and to obtain other information pertinent to the decision to employ

    Background investigation

  • 5

    is the process of inspecting or examining with careful thoroughness the essence of vetting is a personal interview conducted under stress period it is based on information previously given by the applicant.

    Positive vetting

  • 6

    is the process whereby a subject reaction in a future critical situation is predicted by observing his behavior, or by interviewing him , or analyzing his responses to a questionnaire , such as an honest test. The Reid Report is an example of honesty test.

    Prowling

  • 7

    this process of using devices in detecting deception during the interview stage. This includes the use of a Polygraph Psychological Stress Evaluator and Voice Analyzer.

    Deception detection techniques

  • 8

    this type of investigation seeks to gather information on income and mode of living, sometimes referred to as the earning- to-debt ratio.

    Financial and lifestyle inquiry

  • 9

    this is the replacement of an agent in a role in which the agents true identity and role remains unknown , in order to obtain information for criminal prosecution or for recovery or limitation of assets losses.

    Undercover investigation

  • 10

    is conducted to develop security awareness among employees in the company. It should cover all employees, regardless of rank or position.

    Security education

  • 11

    Phases of security Education Program

    Initial interview Orientation and training Refresher conference Security reminders Security promotion

  • 12

    ONE OR MORE PERSONS ACCOMPANYING ANOTHER TO GIVE GUIDANCE OR PROTECTION OR TO PAY HONOR

    Escort

  • 13

    person or a group of persons usually armed and responsible for the physical safety of one or more specific person.

    Bodyguard

  • 14

    Covers the surrounding areas of engagement.

    Area security

  • 15

    Secures the immediate area surrounding the place of engagement.

    Perimeter security

  • 16

    This are the advanced security at the place of engagement before the arrival of the VIP.

    Advanced security

  • 17

    Accompanies the VIP wherever he goes.

    Close-in security

  • 18

    On standby for possible black-up/re-enforcement.

    Reserved security

  • 19

    neutralize the possible route of the VIP party.

    Routine security

  • 20

    I'm individual is particularly vulnerable while moving from one place to another, hence a regular rout e and time travels should be established.

    Protection in transit

  • 21

    The vehicle utilized by a potential kidnap victim should not be placed on attended in a parking stall with the individual name on it . If possible comma when not in use , the vehicle should be parked in a locked garage under guard and nor on the street .

    Vehicle security

  • 22

    The approach will usually be made from the left or passing side, and the attacker will attempt to move over into the path of the victim's vehicles, forcing it to stop. Approach, would be from the right in the left side drive countries period the ideal location for abduction is where cross street are turn off is available to allowed attacker an easy quick way to escape. If two vehicles are used to attack, one will cut off the victim's vehicle, forcing it to stop.

    Moving attacks

  • 23

    The drivers should always be planning ahead and be alert as to what is happening in at least two or three blocks of normal city driving. Vehicles that are packed in the roadway or in unusual position comma obstructions, constructions, etc.

    The driver rule

  • 24

    The protection of the company property information from the inadvertent disclosure and destruction of documents is the paramount focus of information security management. It is closing the window of exposure. Information security in the industry is defined as

    Information security

  • 25

    Access to information security is based on the required broad principles known as

    CIA TRIAD

  • 26

    the assurance that information is only to those authorized to have access.

    Confidentiality

  • 27

    the assurance that information and processing methods are accurate and complete.the assurance that information and processing methods are accurate and complete.

    Integrity

  • 28

    the assurance that authorized users have access to information and associated assets when needed.

    Availability

  • 29

    the assurance that authorized users have access to information and associated assets when needed.

    Availability

  • 30

    Letters, diary and notebooks. These should be treated usually the same with official document.Letters, diary and notebooks. These should be treated usually the same with official document.

    Personal

  • 31

    Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.Orders, manuals, letters, overlays, maps and magazines. You may be careful and follow the chain of command.

    Official

  • 32

    (green color code) — is any information and materials the unauthorized disclosure of it would cause exceptionally grave damage to the nation, politically, economically and military operation.

    Top secret

  • 33

    red color code) — is any information and material, the unauthorized disclosure of it would endanger national security cause serious injury to the interest or prestige Of the nation or any governmental activity or advantage to a foreign nation.

    Secret

  • 34

    blue color code) — Is any information or material, the unauthorized disclosure of it would be prejudicial to the interest and prestige of the national or governmental activity or would cause administrative embarrassment or unwanted injury to and be of advantage to and be of advantage to a foreign country.

    Confidential

  • 35

    white or no color code) — is any information and material which requires special protection other than those determines confidential, secret and top secret. In the security management application, top secret is not used, classified matter will starts on secret classification. This is because the applications is limited or focused only to the industry•

    Restricted

  • 36

    In this category these are records that are irreplaceable, records of which reproduction does not have the same value as the original; records needed to recover cash, to replace building, equipment’s, raw materials, finished products, and work in process and records needed to avoid delay in restoration of production, sales and services.

    Vital documents

  • 37

    These include records the reproduction of which will close considerable expense and labor, or considerable delay.

    Important documents

  • 38

    These include records whose loss might cause inconvenience but could be readily replaced and which would not in the meantime present an insurmountable obstacle to the prompt restoration of the business.

    Useful documents

  • 39

    These records are daily files, routine in nature even if lost or destroyed, will not affect operation or administration.

    Non essential documents

  • 40

    This consist of any formula, pattern, device or compilation of information which is used in one's business and which gives him an opportunity to gain an advantage over competitors who do not know or use it.

    Trade secret

  • 41

    this is a grant made by the government to an inventor, conveying or securing to him the exclusive right to make, use, or sell his invention for term of years.

    Patent

  • 42

    the transfer of thought from We mind of one person to the mind of another thought a common medium or channel.

    Communication

  • 43

    the exchange of thoughts or opinions by conversions, or seminar. The exchange could be from oral, written and other forms.

    Conference

  • 44

    Refers to the common language known for two or more individuals who want to exchange thought or ideas with each other.

    Medium of communication

  • 45

    The ability of an ancient man centuries ago to communicate by means of signs could be as the key for surviving the Stone Age era.

    Communication security

  • 46

    Refers to the equipment’s being used to transfer thoughts or ideas.

    Channel of communication

  • 47

    Communication on electromagnetic waves transmitted through the space.

    Hand held radio or walkie talkie