Questions & Answers Newest Version
2024
1) Convertibility;
2) Value;
3) Portability. - CORRECT ANSWER-Three factors of personal property that can help
business owners determine loss potential from a criminal act.
1) Forced entry into building;
2) Forced entry into protected enclosures;
3) Unforced entry into building or protected enclosures;
4) Forced opening of building and protected enclosures;
5) Vandalism and mailicious acts;
6) Espionage;
7) Shoplifting;
8) Employee theft. - CORRECT ANSWER-Methods criminals use that can result in loss
to real and personal property.
To restrict unauthorized access to property. - CORRECT ANSWER-Main function of
physical and electronic protection devices.
To control access to premises when the business is closed. - CORRECT ANSWER-The
purpose of a perimeter protection system.
Only the openings to the building are protected. - CORRECT ANSWER-"Partial
perimeter protection."
1) Forced entry through walls or ceilings not detected;
, 2) Stay-behind thieves not detected until they leave premises. - CORRECT ANSWER-
Disadvantages of partial perimeter protection.
Protects all openings into the building, including enclosing walls, ceilings and floors. -
CORRECT ANSWER-"Complete perimeter protection."
Physical barriers to restrict unauthorized access to property. - CORRECT
ANSWER-"Physical protection."
1) Locks;
2) Bars or screens. - CORRECT ANSWER-Two kinds of physical protection.
Electronic barriers to restrict unauthorized access to property. - CORRECT
ANSWER-"Electronic protection."
1) Magnetic contact switches;
2) Glass breakage alarms. - CORRECT ANSWER-Two kinds of electronic protection.
To restrict unauthorized entry into areas where valuable property is stored. - CORRECT
ANSWER-The main purpose of area protection devices.
Frequency of false alarms - movement of drapes, banners, signs, etc. - CORRECT
ANSWER-Key disadvantage of motion detector systems.
Senses the body heat of intruder as s/he moves through the area under surveillance;
the change in the normal heat profile causes alarm to trigger. - CORRECT ANSWER-
How infrared intrusion detection systems work.
1) Can be installed to provide several patterns of coverage;
2) Several units can be operated from one master device;