Chapter 9:  Automation in Protection Operations

Chapter 9: Automation in Protection Operations

Professional Development

10 Qs

quiz-placeholder

Similar activities

CompTIA Workshop

CompTIA Workshop

Professional Development

8 Qs

Basic ICS Training - Day 3 Recap

Basic ICS Training - Day 3 Recap

Professional Development

10 Qs

ILO 6 ENRICHMENT ACTIVITY

ILO 6 ENRICHMENT ACTIVITY

Professional Development

10 Qs

CCSP Quiz - Domain One

CCSP Quiz - Domain One

Professional Development

15 Qs

Disaster Management Roles and Systems

Disaster Management Roles and Systems

Professional Development

12 Qs

Play Series - Zero Trust Threat Detection - Week 5

Play Series - Zero Trust Threat Detection - Week 5

Professional Development

15 Qs

Workplace Health and Safety Quiz

Workplace Health and Safety Quiz

1st Grade - Professional Development

15 Qs

Pre dan Post Test Drill Bulan Mei 2024 IT Balongan - LPG

Pre dan Post Test Drill Bulan Mei 2024 IT Balongan - LPG

Professional Development

10 Qs

Chapter 9:  Automation in Protection Operations

Chapter 9: Automation in Protection Operations

Assessment

Quiz

Other, Other

Professional Development

Medium

Created by

Jason Montijo

Used 26+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Automated visitor management systems should only be used in large, complex organizations with multiple facilities.

True

False

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

One use for crime mapping is to help determine where to locate new facilities.

True

False

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Studies indicate that security technologies will soon make security officers obsolete.

True

False

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

Incident Management Systems today are really nothing more than word processing systems that allow an offi cer to enter reports electronically.

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Two dangers mentioned in this chapter that protection professionals should be aware of in using online resources are (choose one) :

The possibility of going off on a tangent rather than focusing on the objective

The possibility of introducing a virus to the system

Accidentally disseminating sensitive information to unauthorized recipients

Assuming that information in online databases is credible

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Among the advantages of automated visitor management systems are:

Ability to reduce costs by integrating with access control systems

Ability to keep a searchable record of visitors

Ability to better account for all building occupants during an evacuation

Ability to support subsequent investigations in the event of an incident

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A study by Bolyard and Powell concluded that “ security officers lacking this knowledge would be placed at a great disadvantage. … ” What “ knowledge ” were they referring to?

An understanding of basic electronic security systems and design parameters

A thorough understanding of contemporary information technology (IT) security threats and risks

An orientation on automated tools such as incident and visitor management systems as well as crime mapping and analysis

An orientation on the historical basis for automation in protection operations as it applies to the security industry in the United States

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?