State of Texas Security Level II Certification Security
Principles Questions with Correct Answers 2025.
A |security |officer |has |the |same |authority |as |a |peace |officer. |TRUE |OR |FALSE |- |Answer- |False
Adequate |Security |- |Answer- |Security |commensurate |with |the |risk |and |the |magnitude |of |harm
|resulting |from |the |loss, |misuse |or |unauthorized |access |to |or |modification |of |information. |Source:
|OMB |Circular |A-130
A |security |officer |can |arrest |a |suspect |for |any |misdemeanor |that |has |been |committed |within |his
|view |or |presence. |- |Answer- |FALSE
Administrative |Controls |- |Answer- |Controls |implemented |through |policy |and |procedures.
|Examples |include |access |control |processes |and |requiring |multiple |personnel |to |conduct |a |specific
|operation. |Administrative |controls |in |modern |environments |are |often |enforced |in |conjunction |with
|physical |and/or |technical |controls, |such |as |an |access-granting |policy |for |new |users |that |requires
|login |and |approval |by |the |hiring |manager.
A |security |services |contractor |can |provide |security |patrol |services |to |a |business |on |a |contractual
|basis. |- |Answer- |TRUE
Artificial |Intelligence |- |Answer- |The |ability |of |computers |and |robots |to |simulate |human |intelligence
|and |behavior.
The |Private |Security |Bureau |has |the |authority |to |license |its |investigators |as |peace |officers. |-
|Answer- |TRUE
Asset |- |Answer- |Anything |of |value |that |is |owned |by |an |organization. |Assets |include |both |tangible
|items |such |as |information |systems |and |physical |property |and |intangible |assets |such |as |intellectual
|property.
One |of |the |primary |roles |of |a |security |officer |is |to |observe |and |report. |- |Answer- |TRUE
, Authentication |- |Answer- |The |act |of |identifying |or |verifying |the |eligibility |of |a |station,
|originator, |or |individual |to |access |specific |categories |of |information. |Typically, |a |measure
|designed |to |protect |against |fraudulent |transmissions |by |establishing |the |validity |of |a
|transmission, |message, |station |or |originator.
A |good |report |will:
A. Be |neat |and |accurate
B. Give |your |opinion
C. Be |legible
D. A |and |C
E. All |of |the |above |- |Answer- |D. |A |and |C
Authorization |- |Answer- |The |right |or |a |permission |that |is |granted |to |a |system |entity |to |access |a
|system |resource. |NIST |800-82 |Rev.2
The |person |that |is |responsible |for |the |daily |operations |for |a |security |company |is |the:
A. Owner
B. Manager
C. Supervisor
D. Licensing |department |- |Answer- |B. |Manager
Availability |- |Answer- |Ensuring |timely |and |reliable |access |to |and |use |of |information |by |authorized
|users.
If |a |police |officer |asks |you |to |leave |your |post, |you |may |refuse. |- |Answer- |False
Baseline |- |Answer- |A |documented, |lowest |level |of |security |configuration |allowed |by |a |standard |or
|organization.
A |security |officer |may |arrest |a |person |for |a |traffic |violation |on |his |post: |- |Answer- |False
Biometric |- |Answer- |Biological |characteristics |of |an |individual, |such |as |a |fingerprint, |hand
|geometry, |voice, |or |iris |patterns.
Principles Questions with Correct Answers 2025.
A |security |officer |has |the |same |authority |as |a |peace |officer. |TRUE |OR |FALSE |- |Answer- |False
Adequate |Security |- |Answer- |Security |commensurate |with |the |risk |and |the |magnitude |of |harm
|resulting |from |the |loss, |misuse |or |unauthorized |access |to |or |modification |of |information. |Source:
|OMB |Circular |A-130
A |security |officer |can |arrest |a |suspect |for |any |misdemeanor |that |has |been |committed |within |his
|view |or |presence. |- |Answer- |FALSE
Administrative |Controls |- |Answer- |Controls |implemented |through |policy |and |procedures.
|Examples |include |access |control |processes |and |requiring |multiple |personnel |to |conduct |a |specific
|operation. |Administrative |controls |in |modern |environments |are |often |enforced |in |conjunction |with
|physical |and/or |technical |controls, |such |as |an |access-granting |policy |for |new |users |that |requires
|login |and |approval |by |the |hiring |manager.
A |security |services |contractor |can |provide |security |patrol |services |to |a |business |on |a |contractual
|basis. |- |Answer- |TRUE
Artificial |Intelligence |- |Answer- |The |ability |of |computers |and |robots |to |simulate |human |intelligence
|and |behavior.
The |Private |Security |Bureau |has |the |authority |to |license |its |investigators |as |peace |officers. |-
|Answer- |TRUE
Asset |- |Answer- |Anything |of |value |that |is |owned |by |an |organization. |Assets |include |both |tangible
|items |such |as |information |systems |and |physical |property |and |intangible |assets |such |as |intellectual
|property.
One |of |the |primary |roles |of |a |security |officer |is |to |observe |and |report. |- |Answer- |TRUE
, Authentication |- |Answer- |The |act |of |identifying |or |verifying |the |eligibility |of |a |station,
|originator, |or |individual |to |access |specific |categories |of |information. |Typically, |a |measure
|designed |to |protect |against |fraudulent |transmissions |by |establishing |the |validity |of |a
|transmission, |message, |station |or |originator.
A |good |report |will:
A. Be |neat |and |accurate
B. Give |your |opinion
C. Be |legible
D. A |and |C
E. All |of |the |above |- |Answer- |D. |A |and |C
Authorization |- |Answer- |The |right |or |a |permission |that |is |granted |to |a |system |entity |to |access |a
|system |resource. |NIST |800-82 |Rev.2
The |person |that |is |responsible |for |the |daily |operations |for |a |security |company |is |the:
A. Owner
B. Manager
C. Supervisor
D. Licensing |department |- |Answer- |B. |Manager
Availability |- |Answer- |Ensuring |timely |and |reliable |access |to |and |use |of |information |by |authorized
|users.
If |a |police |officer |asks |you |to |leave |your |post, |you |may |refuse. |- |Answer- |False
Baseline |- |Answer- |A |documented, |lowest |level |of |security |configuration |allowed |by |a |standard |or
|organization.
A |security |officer |may |arrest |a |person |for |a |traffic |violation |on |his |post: |- |Answer- |False
Biometric |- |Answer- |Biological |characteristics |of |an |individual, |such |as |a |fingerprint, |hand
|geometry, |voice, |or |iris |patterns.