Cpp Some Concept (phase Xx)

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Thames
T
Thames
Community Contributor
Quizzes Created: 6820 | Total Attempts: 9,511,256
| Questions: 28
Please wait...
Question 1 / 28
0 %
0/100
Score 0/100
1. What are the two generally accepted definitions of risk?

Explanation

Pure risk involves the possibility of loss without the possibility of gain, while speculative risk involves the possibility of both loss and gain. Dynamic risk and static risk are not commonly accepted definitions in risk management. Systematic risk and unsystematic risk refer to different types of market risks. Financial risk and operational risks are specific categories of risks within an organization.

Submit
Please wait...
About This Quiz
CPP Some Concept (Phase Xx) - Quiz

This quiz, titled 'Cpp Some Concept (phase Xx)', assesses advanced knowledge in C++ programming, focusing on specific concepts crucial for professional certification. It is designed to test and... see moreenhance the learner's understanding of complex C++ features, preparing them for industry-standard compliance and performance. see less

2. For adequate protection of assets, the proprietor of a private enterprise?

Explanation

The correct answer highlights the importance of self-dependence in protecting assets, while also acknowledging the need for external intervention in cases of major threats to public peace.

Submit
3. Who should issue a policy statement covering an organization's security program?

Explanation

The policy statement regarding an organization's security program should be issued by top management as they have the authority to set expectations and enforce compliance throughout the organization.

Submit
4. What is the typical cause of business crime losses?

Explanation

Business crime losses are most commonly attributed to non-violent acts committed by insiders, such as embezzlement or fraud. Violent acts by outsiders, natural disasters, and technological malfunctions are not typically the primary causes of business crime losses.

Submit
5. What is considered the most important and generally the most expensive type of countermeasure?

Explanation

When addressing security measures, the human element is often considered to be the most important and costly aspect to consider. While technology, training, and policies are important factors, the actions and decisions of individuals within an organization can have the greatest impact on security.

Submit
6. Consensual standards represent authoritative opinions of groups of recognized specialists and experts and are?

Explanation

Consensual standards are typically voluntary guidelines agreed upon by experts in a particular field, but they do not carry the force of law unless adopted by regulatory agencies. Therefore, they are not generally legally binding.

Submit
7. To define a security program it is necessary to know?

Explanation

To define a security program effectively, it is crucial to understand the threats that the organization faces, the potential impact those threats could have, and the frequency at which they might occur. This knowledge forms the basis for developing relevant security measures and strategies.

Submit
8. When evaluating the probability of the occurrence of a loss event, what does the number of ways that a particular event can occur in given circumstances indicate?
Submit
9. Which of the following is considered an indirect cost in a loss event?

Explanation

Indirect costs are costs that are not directly traceable to a specific cost object, such as a product or service. The morale of employees can be considered an indirect cost as it may not have a direct monetary value but can impact productivity and overall costs in a loss event.

Submit
10. We note a trend toward closer integration of the components of Risk Management in many organizations. Which of the following is NOT a component of Risk Management?

Explanation

In Risk Management, loss prosecution is not a component. Risk assessment involves identifying potential risks, risk mitigation involves taking actions to reduce risks, and risk transfer involves shifting the burden of risk to another party.

Submit
11. What is an advantage of using the team interviewing technique in a vulnerability assessment?

Explanation

The team interviewing technique ensures that a variety of perspectives are considered in the vulnerability assessment, reducing the likelihood of important departmental interactions being missed. This can lead to a more comprehensive understanding of the organization's vulnerabilities.

Submit
12. What does the fraud known as 'lapping' involve in the accounts receivable unit?

Explanation

In the context of the accounts receivable unit, 'lapping' specifically refers to the practice of delaying the posting of a cash payment in order to cover up a prior theft. The other incorrect answers involve different forms of financial fraud or misreporting that are not directly related to the concept of lapping.

Submit
13. What are the three most important supervisory practices to encourage employees’ voluntary reporting of security incidents?

Explanation

To encourage employees to voluntarily report security incidents, it is essential to provide frequent encouragement, prompt recognition, and a prompt response. Inconsistent feedback, delayed recognition, blaming employees, ignoring the issue, lack of recognition, and slow response can all hinder the reporting of security incidents.

Submit
14. Are eight-inch reinforced concrete walls easy to penetrate?

Explanation

While eight-inch reinforced concrete walls are strong, they can be breached with the right tools and techniques. Small amounts of explosives and hand tools can be used to penetrate them, showing that they are not impenetrable but can be overcome under certain conditions.

Submit
15. Which of the following methods of window glass installation will provide the most difficulty in removing the glass without leaving signs of the removal?

Explanation

Windows installed in grooves secured with elastic glazing compound are more difficult to remove without leaving signs of removal due to the strong adhesive nature of the compound securing the glass in place.

Submit
16. Which of the following types of glass has the most distortion and is most vulnerable to breakage?

Explanation

Sheet glass is typically thin and vulnerable to distortion and breakage compared to tempered, laminated, and float glass which have varying levels of strength and durability.

Submit
17. What is the characteristic of thermally tempered glass when fully tempered?

Explanation

Thermally tempered glass, when fully tempered, is designed to disintegrate into small cubes or crystals without sharp edges for safety purposes.

Submit
18. In the construction of a chain link fence the posts at the ends and corners of the fence and those used to support gates are known as?

Explanation

Terminal posts are the end posts and corner posts of a chain link fence which provide stability and support to the fence structure. Intermediate posts are the ones between terminal posts, corner posts specifically refer to the posts at the corners, and gate posts are the ones that support gates within the fence.

Submit
19. One of the most common errors made, and one that negates the effectiveness of the chain link fence is the failure to?

Explanation

The correct answer focuses on creating a clear zone along the fence to prevent obstructions or hiding places for intruders, which is crucial for the effectiveness of the chain link fence.

Submit
20. What is a potential downside of master keying a conventional pin tumbler lock?

Explanation

Master keying a lock can increase the risk of unauthorized access as it creates more potential entry points.

Submit
21. The shear line in a pin tumbler lock is the line?

Explanation

The shear line in a pin tumbler lock is specifically where the meeting point of the pin and driver is exactly even with the edge of the plug, allowing the lock to open when the correct key is used.

Submit
22. What is the main reason that locking systems become vulnerable?

Explanation

Locking systems become vulnerable mainly due to the loss of keys, as it provides unauthorized access to individuals who may use them for malicious purposes.

Submit
23. Ideally, a passive infra-red sensor should be mounted in such a location that an intruder would pass:

Explanation

Mounting a passive infra-red sensor across the field of view ensures that the sensor can detect an intruder as they move through the area being monitored. Placing it directly underneath, behind, or far away from the sensor may result in blind spots or reduced effectiveness in detecting intruders.

Submit
24. What is a system with local alarm termination?

Explanation

A system with local alarm termination utilizes a sound generating device on the exterior wall to alert to a violation, rather than sending alerts remotely, triggering alarms based on repetition, or disabling the system after false alarms.

Submit
25. What is an uninterruptible power supply (UPS) power support system?

Explanation

An uninterruptible power supply (UPS) power support system utilizes batteries to supply uninterrupted power to the security system, ensuring continuous operation even when normal power is unavailable. It does not rely on solar energy, connect directly to the main power grid, or use wind turbines for power generation.

Submit
26. What are the three phases of integrated security system development?

Explanation

The correct answer consists of the initial planning phase, followed by the design phase, and finally the implementation phase to develop an integrated security system.

Submit
27. When proposals or bids have been received the proposal costs, including the life cycle cost, are compared. The life cycle cost is the…?

Explanation

The life cycle cost is not just the initial cost of the system or the maintenance cost for the first year, but rather it encompasses both the capital cost and maintenance cost over the entire useful life of the system.

Submit
28. In a telecommunications system, what is multiplexing?
Submit
View My Results

Quiz Review Timeline (Updated): Aug 4, 2025 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Aug 04, 2025
    Quiz Edited by
    ProProfs Editorial Team
  • Aug 04, 2025
    Quiz Created by
    Thames
Cancel
  • All
    All (28)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
What are the two generally accepted definitions of risk?
For adequate protection of assets, the proprietor of a private...
Who should issue a policy statement covering an organization's...
What is the typical cause of business crime losses?
What is considered the most important and generally the most expensive...
Consensual standards represent authoritative opinions of groups of...
To define a security program it is necessary to know?
When evaluating the probability of the occurrence of a loss event,...
Which of the following is considered an indirect cost in a loss event?
We note a trend toward closer integration of the components of Risk...
What is an advantage of using the team interviewing technique in a...
What does the fraud known as 'lapping' involve in the accounts...
What are the three most important supervisory practices to encourage...
Are eight-inch reinforced concrete walls easy to penetrate?
Which of the following methods of window glass installation will...
Which of the following types of glass has the most distortion and is...
What is the characteristic of thermally tempered glass when fully...
In the construction of a chain link fence the posts at the ends and...
One of the most common errors made, and one that negates the...
What is a potential downside of master keying a conventional pin...
The shear line in a pin tumbler lock is the line?
What is the main reason that locking systems become vulnerable?
Ideally, a passive infra-red sensor should be mounted in such a...
What is a system with local alarm termination?
What is an uninterruptible power supply (UPS) power support system?
What are the three phases of integrated security system development?
When proposals or bids have been received the proposal costs,...
In a telecommunications system, what is multiplexing?
Alert!

Advertisement