
Chapter 9: Automation in Protection Operations
Authored by Jason Montijo
Other, Other
Professional Development
Used 26+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Automated visitor management systems should only be used in large, complex organizations with multiple facilities.
True
False
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
One use for crime mapping is to help determine where to locate new facilities.
True
False
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Studies indicate that security technologies will soon make security officers obsolete.
True
False
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
Incident Management Systems today are really nothing more than word processing systems that allow an offi cer to enter reports electronically.
True
False
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Two dangers mentioned in this chapter that protection professionals should be aware of in using online resources are (choose one) :
The possibility of going off on a tangent rather than focusing on the objective
The possibility of introducing a virus to the system
Accidentally disseminating sensitive information to unauthorized recipients
Assuming that information in online databases is credible
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Among the advantages of automated visitor management systems are:
Ability to reduce costs by integrating with access control systems
Ability to keep a searchable record of visitors
Ability to better account for all building occupants during an evacuation
Ability to support subsequent investigations in the event of an incident
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A study by Bolyard and Powell concluded that “ security officers lacking this knowledge would be placed at a great disadvantage. … ” What “ knowledge ” were they referring to?
An understanding of basic electronic security systems and design parameters
A thorough understanding of contemporary information technology (IT) security threats and risks
An orientation on automated tools such as incident and visitor management systems as well as crime mapping and analysis
An orientation on the historical basis for automation in protection operations as it applies to the security industry in the United States
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?