1 / 299

Security Management

Security Management. Sample Questions. 1. One supervisor can effectively control only a limited number of people and that limit should not be exceeded. This principle is called:. a. Unity of command b. Supervisory limits c. Span of control d. Line of discipline.

alloway
Download Presentation

Security Management

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Security Management Sample Questions

  2. 1. One supervisor can effectively control only a limited number of people and that limit should not be exceeded. This principle is called: • a. Unity of command • b. Supervisory limits • c. Span of control • d. Line of discipline

  3. 1. One supervisor can effectively control only a limited number of people and that limit should not be exceeded. This principle is called: • a. Unity of command • b. Supervisory limits • c. Span of control • d. Line of discipline

  4. 2. An important principle of organization is that an employee should be under the direct control of one and only one immediate supervisor. This principle is : • a. Unity of command • b. Supervisory limits • c. Span of control • d. Line of discipline

  5. 2. An important principle of organization is that an employee should be under the direct control of one and only one immediate supervisor. This principle is : • a. Unity of command • b. Supervisory limits • c. Span of control • d. Line of discipline

  6. 3. From an organizational standpoint, the head of security should report to: • a. Superintendent of buildings • b. Manager of buildings and grounds • c. Head housekeeper • d. A vice-president or higher

  7. 3. From an organizational standpoint, the head of security should report to: • a. Superintendent of buildings • b. Manager of buildings and grounds • c. Head housekeeper • d. A vice-president or higher

  8. 4. The most conspicuous role of the security department in any organization is that of: • a. Educational services • b. Management services • c. Special services • d. Protective services

  9. 4. The most conspicuous role of the security department in any organization is that of: • a. Educational services • b. Management services • c. Special services • d. Protective services

  10. 5. Training sessions consisting of a security awareness program for new employees should be conducted by: • a. Special training officers • b. Security personnel • c. Consultants skilled in training • d. Member of management

  11. 5. Training sessions consisting of a security awareness program for new employees should be conducted by: • a. Special training officers • b. Security personnel • c. Consultants skilled in training • d. Member of management

  12. 6. There are necessary and legitimate exceptions to the principle of unity of command. One condition which sometimes allows for shifting in supervision is: • a. When order is given by the rank of captain or above • b. When order is given by the head of a department • c. When the order is given by the head of internal affairs • d. During emergencies

  13. 6. There are necessary and legitimate exceptions to the principle of unity of command. One condition which sometimes allows for shifting in supervision is: • a. When order is given by the rank of captain or above • b. When order is given by the head of a department • c. When the order is given by the head of internal affairs • d. During emergencies

  14. 7. Perhaps the most common shortcoming in the security industry is: • a. Lack of support by top management • b. Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisor training) • c. Lack of planning • d. Lack of monetary resources

  15. 7. Perhaps the most common shortcoming in the security industry is: • a. Lack of support by top management • b. Failure to properly prepare and equip new supervisors with tools to discharge their important responsibilities (supervisor training) • c. Lack of planning • d. Lack of monetary resources

  16. 8. As a rule, which department of the company administers the recruiting activity? • a. The security department • b. Administrative department • c. Personnel department • d. Internal affairs

  17. 8. As a rule, which department of the company administers the recruiting activity? • a. The security department • b. Administrative department • c. Personnel department • d. Internal affairs

  18. 9. In non-entry level recruiting, the recommended technique is: • a. “Blind ad” • b. Open advertisement in newspaper • c. Advertisement in trade journal • d. By word of mouth on selective basis

  19. 9. In non-entry level recruiting, the recommended technique is: • a. “Blind ad” • b. Open advertisement in newspaper • c. Advertisement in trade journal • d. By word of mouth on selective basis

  20. 10. Every applicant’s first interview should be with: • a. The security manager director • b. The security supervisor • c. A security line employee • d. A personnel interviewer

  21. 10. Every applicant’s first interview should be with: • a. The security manager director • b. The security supervisor • c. A security line employee • d. A personnel interviewer

  22. 11. The heart of personnel selection is: • a. Polygraph test • b. Review of application • c. Interview • d. Background investigation

  23. 11. The heart of personnel selection is: • a. Polygraph test • b. Review of application • c. Interview • d. Background investigation

  24. 12. Which of the following is not recommended policy with regard to security manuals? • a. It must be updated on a regular basis • b. Employees should not be allowed to have possession of it • c. The manual should be put in the hands of all regular security personnel • d. It should include procedural instructions for specific incidents

  25. 12. Which of the following is not recommended policy with regard to security manuals? • a. It must be updated on a regular basis • b. Employees should not be allowed to have possession of it • c. The manual should be put in the hands of all regular security personnel • d. It should include procedural instructions for specific incidents

  26. 13. Discipline is primarily the responsibility of: • a. The supervisor • b. The employee • c. The security manager or director • d. The inspection division

  27. 13. Discipline is primarily the responsibility of: • a. The supervisor • b. The employee • c. The security manager or director • d. The inspection division

  28. 14. Among classical theories of human behavior in the work environment, one emphasizes negative aspects of employee behavior which is known as: • a. The autocrat theory • b. The custodial theory • c. The supportive theory • d. McGregor’s “Theory X”

  29. 14. Among classical theories of human behavior in the work environment, one emphasizes negative aspects of employee behavior which is known as: • a. The autocrat theory • b. The custodial theory • c. The supportive theory • d. McGregor’s “Theory X”

  30. 15. Among classical theories of human behavior in the work environment is one which suggests that employees do not inherently dislike work and will actually seek responsibility and better performance if encouraged to do so. It is known as: • a. McGregor’s “Theory Y” • b. McGregor’s “Theory X” • c. The supportive theory • d. The motivation theory

  31. 15. Among classical theories of human behavior in the work environment is one which suggests that employees do not inherently dislike work and will actually seek responsibility and better performance if encouraged to do so. It is known as: • a. McGregor’s “Theory Y” • b. McGregor’s “Theory X” • c. The supportive theory • d. The motivation theory

  32. 16. Dr. Frederick Herzberg developed a position that motivation comes from work itself, not from those factors such as salary and job security. This theory is known as: • a. The supportive theory • b. The work motivation theory • c. The custodial theory • d. McGregor’s “Theory X”

  33. 16. Dr. Frederick Herzberg developed a position that motivation comes from work itself, not from those factors such as salary and job security. This theory is known as: • a. The supportive theory • b. The work motivation theory • c. The custodial theory • d. McGregor’s “Theory X”

  34. 17. Which of the following is not an advantage of using in-house (career) personnel? • a. Career personnel develop a loyalty to the department • b. Career personnel tend to be more ambitious • c. There is more stability among career personnel • d. Career personnel constitute a fixed, limited cadre or pool of manpower resources

  35. 17. Which of the following is not an advantage of using in-house (career) personnel? • a. Career personnel develop a loyalty to the department • b. Career personnel tend to be more ambitious • c. There is more stability among career personnel • d. Career personnel constitute a fixed, limited cadre or pool of manpower resources

  36. 18. Which of the following is known to be one of the disadvantages of contract security services? • a. Turnover • b. Cost • c. Manpower resource • d. Skills

  37. 18. Which of the following is known to be one of the disadvantages of contract security services? • a. Turnover • b. Cost • c. Manpower resource • d. Skills

  38. 19. Ideally, the person who should conduct the inspection of a security department is: • a. An outside consultant • b. The second ranking person • c. The security director or security manager • d. The ranking sergeant

  39. 19. Ideally, the person who should conduct the inspection of a security department is: • a. An outside consultant • b. The second ranking person • c. The security director or security manager • d. The ranking sergeant

  40. 20. The process of determining the probability and cost of potential loss is known as: • a. Probability analysis • b. Risk assessment • c. Potential loss analysis • d. Physical survey

  41. 20. The process of determining the probability and cost of potential loss is known as: • a. Probability analysis • b. Risk assessment • c. Potential loss analysis • d. Physical survey

  42. 21. In conducting background investigations, it is good policy to: • a. Not let prospective employee know investigation is being conducted • b. Restrict investigation to “confidential” records checks • c. Restrict investigation to employment checks • d. Advise applicant of forthcoming investigation and secure his permission

  43. 21. In conducting background investigations, it is good policy to: • a. Not let prospective employee know investigation is being conducted • b. Restrict investigation to “confidential” records checks • c. Restrict investigation to employment checks • d. Advise applicant of forthcoming investigation and secure his permission

  44. 22. The ultimate responsibility for the internal security in a department should rest with: • a. The president • b. Chairman of the board • c. Security director • d. The line supervisor

  45. 22. The ultimate responsibility for the internal security in a department should rest with: • a. The president • b. Chairman of the board • c. Security director • d. The line supervisor

  46. 23. The behavioral scientist whose key concept is that every executive relates to his subordinates on the basis of a set of assumptions termed theory X and theory Y was formulated by: • a. Abraham Maslow • b. Douglas McGregor • c. Warren Bennis • d. B.F. Skinner

  47. 23. The behavioral scientist whose key concept is that every executive relates to his subordinates on the basis of a set of assumptions termed theory X and theory Y was formulated by: • a. Abraham Maslow • b. Douglas McGregor • c. Warren Bennis • d. B.F. Skinner

  48. 24. The issuance of weapons to guards is usually not justified: • a. In a situation where deterrence is needed in handling control of large amounts of cash • b. In situations in which terrorism is a real threat • c. In situations where there would be greater danger to life without weapons than with them • d. In a situation where there is no danger to life safety

  49. 24. The issuance of weapons to guards is usually not justified: • a. In a situation where deterrence is needed in handling control of large amounts of cash • b. In situations in which terrorism is a real threat • c. In situations where there would be greater danger to life without weapons than with them • d. In a situation where there is no danger to life safety

  50. 25. In issuing policy statements regarding the handling of disturbed persons, the primary consideration is: • a. Legal liability to the disturbed • b. Reducing the disturbed person to a form of benevolent custody and eliminating the immediate danger • c. Legal liability to employees and third persons if restraint not achieved • d. Employee-community public relations

More Related