CAIB 2 - Chapter 6 Exam With Correct
Answers
identify three types of crime losses to real property - ANS-vandalism
n n n n n n n n n n
malicious acts n
burglary and arson
n n
identify three reasons why some types of personal property become 'target items' -
n n n n n n n n n n n n
nANS-convertibility (the ease with which property can be converted to cash)
n n n n n n n n n n
value
portability
identify eight methods used by criminals which can result in loss to real and personal
n n n n n n n n n n n n n n
nproperty - ANS--forced entry into building and protected enclosures
n n n n n n n n
-unforced entry into building or protected enclosures
n n n n n n
-forced opening of building and protected enclosures
n n n n n n
-vandalism and malicious acts n n n
-espionage (spies) n
-shoplifting
-employee theft n
identify three key areas which make 'forcible entry' into a building vulnerable to attack -
n n n n n n n n n n n n n n
nANS-doors
windows,
other openings, roof, wall
n n n
identify three types of 'protected enclosures' - ANS-locked safes
n n n n n n n n
chests
vaults
, identify three ways in which access can be obtained into 'protected enclosures' - ANS-
n n n n n n n n n n n n n
mechanical, thermal, explosion * n n n
identify how businesses can restrict unauthorized access to property - ANS-physical
n n n n n n n n n n
nandn
electronic protection n
identify any three types of physical barriers that may restrict unauthorized access to
n n n n n n n n n n n n
nproperty - ANS-steel doors and bars
n n n n n
high security locks
n n
window locks, bars, screens
n n n
identify any three types of electronic barriers that may restrict unauthorized access to
n n n n n n n n n n n n
nprooperty - ANS-motion detectors n n n
vibration detectors n
hold up alarms, glass breakage alarm
n n n n n
identify the three components of the most effective security system to protect valuable
n n n n n n n n n n n n
nproperty - ANS-perimeter protection
n n n
area and space protection
n n n
point protection
n
identify the two types of perimeter protection - ANS-partial protection
n n n n n n n n n
complete protection n
identify two weaknesses of partial protection - ANS-forced entry through walls, or
n n n n n n n n n n n
nceilings will not be detected
n n n n
stay behind thieves will not be detected until they leave the premises
n n n n n n n n n n n
identify three areas that will address complete protection - ANS-enclosing walls,
n n n n n n n n n n
ceilings,
floors
identify the 'first' line of physical defense in perimeter protection - ANS-locks
n n n n n n n n n n n
identify three advantages of dead bolts - ANS-can be locked or unlocked only with a key
n n n n n n n n n n n n n n n
theres no spring action involved
n n n n
cannot be slipped open with credit card
n n n n n n
identify two types of electronic defenses in perimeter protection - ANS-magnetic contact
n n n n n n n n n n n
nswitches
glass breakage alarms
n n
Answers
identify three types of crime losses to real property - ANS-vandalism
n n n n n n n n n n
malicious acts n
burglary and arson
n n
identify three reasons why some types of personal property become 'target items' -
n n n n n n n n n n n n
nANS-convertibility (the ease with which property can be converted to cash)
n n n n n n n n n n
value
portability
identify eight methods used by criminals which can result in loss to real and personal
n n n n n n n n n n n n n n
nproperty - ANS--forced entry into building and protected enclosures
n n n n n n n n
-unforced entry into building or protected enclosures
n n n n n n
-forced opening of building and protected enclosures
n n n n n n
-vandalism and malicious acts n n n
-espionage (spies) n
-shoplifting
-employee theft n
identify three key areas which make 'forcible entry' into a building vulnerable to attack -
n n n n n n n n n n n n n n
nANS-doors
windows,
other openings, roof, wall
n n n
identify three types of 'protected enclosures' - ANS-locked safes
n n n n n n n n
chests
vaults
, identify three ways in which access can be obtained into 'protected enclosures' - ANS-
n n n n n n n n n n n n n
mechanical, thermal, explosion * n n n
identify how businesses can restrict unauthorized access to property - ANS-physical
n n n n n n n n n n
nandn
electronic protection n
identify any three types of physical barriers that may restrict unauthorized access to
n n n n n n n n n n n n
nproperty - ANS-steel doors and bars
n n n n n
high security locks
n n
window locks, bars, screens
n n n
identify any three types of electronic barriers that may restrict unauthorized access to
n n n n n n n n n n n n
nprooperty - ANS-motion detectors n n n
vibration detectors n
hold up alarms, glass breakage alarm
n n n n n
identify the three components of the most effective security system to protect valuable
n n n n n n n n n n n n
nproperty - ANS-perimeter protection
n n n
area and space protection
n n n
point protection
n
identify the two types of perimeter protection - ANS-partial protection
n n n n n n n n n
complete protection n
identify two weaknesses of partial protection - ANS-forced entry through walls, or
n n n n n n n n n n n
nceilings will not be detected
n n n n
stay behind thieves will not be detected until they leave the premises
n n n n n n n n n n n
identify three areas that will address complete protection - ANS-enclosing walls,
n n n n n n n n n n
ceilings,
floors
identify the 'first' line of physical defense in perimeter protection - ANS-locks
n n n n n n n n n n n
identify three advantages of dead bolts - ANS-can be locked or unlocked only with a key
n n n n n n n n n n n n n n n
theres no spring action involved
n n n n
cannot be slipped open with credit card
n n n n n n
identify two types of electronic defenses in perimeter protection - ANS-magnetic contact
n n n n n n n n n n n
nswitches
glass breakage alarms
n n