CPO TEST LATEST ACTUAL EXAM 350
QUESTIONS AND CORRECT DETAILED ANSWERS
WITH RATIONALES (VERIFIED ANSWERS)
|ALREADY GRADED A+
Argus and Schon, in 1978, developed a theory known as the "double loop learning" model. With this double loop communications in an organization, all employees can experience which of the following? - ANSWER- Becoming stakeholders who have a vested interest in the success of the security awareness effort
Double loop communications includes which of the following? - ANSWER- Feedback from employees
To develop security awareness in a security officer department, which of the following is not necessary, having little to do with security awareness? - ANSWER- each new employee should be given a payroll and benefits orientation
Fire alarm early warning devices include which of the following? - ANSWER- Wall mounted fire alarm pull stations
Alarm systems incorporate a wide variety of sensors at various points throughout a protected facility. the basic purpose of a sensor is to do which of the following? - ANSWER- Detect a physical change in the environment, interpret what event might be taking place and transmit that information back to a central processor in the dispatch officer Intrusion sensors are set up to alert that dispatcher an unauthorized person has breached security and accessed a protected area. All of the following intrusion sensors are commonly used in alarm systems except
- ANSWER- Auto-electromechanical RF sensors
There are many reasons to go keyless and use card access for the numerous doors in a large manufacturing site. Which of the following is one of those reasons? - ANSWER- A card access system can best control access to sensitive areas by identifying who enters each of these areas of the facility
Automated tools for visitor management have several advantages.Which of the following is one of those advantages?
- the ability to keep a searchable record of visitors
- The ability to generate reports based on individuals, companies, and
- the ability to use the information in future investigations
- All the above - ANSWER- All the above
date ranges
Today there are a number of technological applications in the protection population that support the security effort. which of the following is not one of those support systems? - ANSWER- Canine foot patrol
Another category of automation useful to the security effort is crime mapping. Which of the following represents a crime mapping service? - ANSWER- CAP Index
There are several vendors offering an automated solution for Criminal intelligence analysis. These tools enable investigators to quickly understand complex scenarios and volumes of seemingly unrelated data.Which of the following is one of those vendors? - ANSWER- i2 Incorporated
Based on organizational needs, there are several major purposes of patrol. Which of the following is one of those purposes of patrol?
- Detection
- Prevention
- Investigation
- All the above - ANSWER- All the above
it is important for security officers to be fully aware of which of the following before embarking on a parol? - ANSWER- What is expected of the patrol Officer
While on patrol the security officers must assess what is observed and then report and record foreseeable loss event occurrence. These reportable potential loss events may include all of the following except - ANSWER- Sanitary conditions
A crime cannot occur if which of the following elements are missing?
- Opportunity
- Desire
- Tools
- Any of the above - ANSWER- Any of the above
When stopping traffic, after gaining the lead motorist's attention tow clearly defined motions are required. Which of the following is not part of one of those motions? - ANSWER- Extend both arms over your head and wave them back and forth in rapid succession
When directing heavy traffic and you are asked for information by a motorit you should... - ANSWER- Motion the motorist to the curb and leave the position to assist
Since traffic control on duty may require an officer to remain at their post for hours in all kinds of weather, which of the following clothing must be readily available?
- Clothing to protect from rain
- Clothing to protect against the severe cold
- Clothing to make the officer highly bisible
- All the above - ANSWER- All the above
Next to the protection of employees, companies are interested in the protection of company assets. Possibly the most important asset worth protecting would be which of the following?A; Reputation Damage
Reputational Damage can occur through which of the following? (ALL
OF THE ABOVE)
- theft of customer information
- loss of a senior executive to injury or death
- tainting of the company brand name
T OR F: One step in the risk management process is mitigation.
Mitigation means employing tactics that reduce the probability of a loss event occurrence and/or reduction of the amount of damage and cost of a lost event. The problem is that good mitigation programs must be designed to interfere with the option of profitability of the enterprise.