1.
Access management is often referred to by security personnel and security equipment manufacturers by the acronym IAM, which is defined as:
Correct Answer
B. Identity and Access Management
Explanation
Access management, also known as IAM (Identity and Access Management), is a term commonly used by security personnel and manufacturers of security equipment. IAM refers to the processes and technologies used to control and manage user access to systems, applications, and data within an organization. It involves identifying and authenticating users, authorizing their access to resources, and enforcing security policies to ensure that only authorized individuals have appropriate access privileges. Therefore, the correct answer is "Identity and Access Management."
2.
The basic principles of Identity and Access Management are: (Select three)
Correct Answer(s)
A. Who
C. Where
D. Why
Explanation
The basic principles of Identity and Access Management involve understanding "Who" is accessing the system, "Where" they are accessing it from, and "Why" they need access. These principles help ensure that only authorized individuals are granted access to sensitive information and resources, and that their access is appropriate and necessary for their role or responsibilities. By considering these factors, organizations can effectively manage and control user identities and access rights, mitigating the risk of unauthorized access and potential data breaches.
3.
The ability to respond quickly, effectively and decisively in a crisis is one of the most important skills that the security professional needs to develop.
Correct Answer
A. True
Explanation
The statement emphasizes the importance of the ability to respond quickly, effectively, and decisively in a crisis for security professionals. This implies that developing this skill is crucial for their role. Therefore, the correct answer is True.
4.
When the crisis has been controlled, it will not be necessary to undertake a security review.
Correct Answer
B. False
Explanation
The statement is incorrect because even after a crisis has been controlled, it is still necessary to undertake a security review. This is because a crisis may have exposed vulnerabilities or weaknesses in the security measures, and a review is essential to identify and address these issues to prevent future crises or security breaches. Therefore, the correct answer is False.
5.
The associations and regulatory groups that security personnel should be accredited to are as follows: (Select three)
Correct Answer(s)
A. Security Industry Authorities Approved Contractors register
B. ISO 9001
D. BS7858
Explanation
Security personnel should be accredited to the Security Industry Authorities Approved Contractors register, ISO 9001, and BS7858. The Security Industry Authorities Approved Contractors register ensures that security personnel meet certain standards and regulations. ISO 9001 is an international standard for quality management systems, indicating that security personnel adhere to high-quality standards. BS7858 is a British standard for screening individuals employed in a security environment, ensuring that security personnel are trustworthy and reliable.
6.
The ______ process is more complicated and involves several stages.
Correct Answer
B. Tender
Explanation
The tender process refers to the process of inviting bids or proposals from suppliers or contractors to provide goods or services. It typically involves several stages such as advertising, pre-qualification, submission of bids, evaluation, and awarding the contract. This process is more complicated because it requires careful planning, documentation, and evaluation of multiple proposals before selecting the most suitable supplier or contractor.
7.
What types of physical security technology will a security professional work with?
Correct Answer
B. Electronic
Explanation
A security professional will work with electronic physical security technology. This includes systems such as surveillance cameras, access control systems, alarm systems, and biometric devices. These technologies are designed to enhance the security of physical spaces by monitoring and controlling access, detecting intrusions, and providing evidence in case of incidents. By utilizing electronic physical security technology, security professionals can effectively protect assets, deter potential threats, and ensure the safety of individuals within a given environment.
8.
The security professional will need to define their own criteria based on the following guidelines: (Select three)
Correct Answer(s)
B. Site Management
D. Warranty and Insurance
E. Confidentiality
Explanation
The security professional will need to define their own criteria based on the guidelines of Site Management, Warranty and Insurance, and Confidentiality. Site Management is important as it involves managing and securing the physical location of the system. Warranty and Insurance are crucial for ensuring that any potential damages or losses are covered. Confidentiality is essential to protect sensitive information from unauthorized access or disclosure. These three criteria provide a comprehensive approach to ensuring the security of the system.
9.
There are three key skills that will enable the security professional to reduce the threat to a minimum.
Correct Answer
B. Trend Recognition
Explanation
Trend Recognition is one of the three key skills that enable security professionals to reduce threats to a minimum. By being able to recognize trends, security professionals can identify patterns and anticipate potential threats or vulnerabilities. This skill involves staying updated on the latest security trends, understanding common attack vectors, and being aware of emerging threats in the industry. With trend recognition, security professionals can proactively implement measures to mitigate risks and protect systems, networks, and data from potential threats.