32E Final
0 of 37 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
You must sign in or sign up to start the quiz.
You must first complete the following:
Quiz complete. Results are being recorded.
0 of 37 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0 )
Earned Point(s): 0 of 0 , (0 )
0 Essay(s) Pending (Possible Point(s): 0 )
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
Question 1 of 37
The EPI method of risk assessment used the formula T x V x I = R. One of the following words is NOT a correct factor in this formula. Mark the INCORRECT answer.
Question 2 of 37
Four vulnerability factors were covered in the Risk Assessment session. Reserved parking spaces with the individual’s name, title or position noted is primarily an example of which?
Question 3 of 37
In an exchange of gunfire several factors impact the outcome. But, the most important factor in stopping the assault is:
Question 4 of 37
When reviewing blockade types of vehicular ambushes, several elements of an ambush were covered. Which of the following was NOT considered necessary to conduct an ambush:
Question 5 of 37
The use of encryption technology can help you with:Â
Question 6 of 37
TRUE OR FALSE: When traveling with the client, since GPS systems and online maps are so easy to use and accurate, you can save time and skip running the route ahead of time.Â
Question 7 of 37
TRUE OR FALSE: When using an anti-virus program you only need to update the virus definitions monthly.
Question 8 of 37
OODA as presented in the class, stands for Observe… This question is worth two points each for a possible of six total points
Question 9 of 37
TRUE OR FALSE: The information requirements of the potential adversary has no bearing on. Operational Security (OPSEC)
Question 10 of 37
TRUE OR FALSE: In a venue with a stage, the term “stage right” refers to the right side of the stage when you are standing on stage looking out to the audience.
Question 11 of 37
TRUE OR FALSE: In a venue with a stage, the term “house left” refers to the side of the venue that is on the left when you look out from the stage.
Question 12 of 37
In a venue, the term “green room” refers to:
Question 13 of 37
A well constructed emergency action plan will include several specific elements including…This question is worth two points for each answer. There are three correct answers for a total possible of six points.
Question 14 of 37
TRUE OR FALSE: Any PPS may be an independent contractor as long as they file a 1099 Form with the IRS
Question 15 of 37
TRUE OR FALSE: Any American citizen may travel to another country without a visa so long as they do not stay more than 90 days.
Question 16 of 37
TRUE OR FALSE: The advance person is the least important member on a detail.
Question 17 of 37
In personal protection work, the term “low profile” refers to the following:
Question 18 of 37
A critical element for calculating your protectee’s vulnerabilities?
Question 19 of 37
Intelligence is information that
Question 20 of 37
Which one of the following is NOT one of the seven commonly noted
Question 21 of 37
PPS agents have what authority, with regard to placing an individual under arrest?
Question 22 of 37
The evidence necessary to convict in a criminal proceeding is:
Question 23 of 37
The evidence necessary to prevail in a civil proceeding is:
Question 24 of 37
Which of the following is not a use of force:
Question 25 of 37
The legal definition of assault contains the elements of:
Question 26 of 37
The recognition of a concealed weapons permit issued by individual states:
Question 27 of 37
Before providing care to another person you should:
Question 28 of 37
FILL IN THE BLANK: What are the 3 principles of a good security program?
Question 29 of 37
FILL IN THE BLANK: For EP program to be accepted in a Private Family and Corporate Environment there are two requirements that must be met. What are they?
Question 30 of 37
TRUE OR FALSE: The threat intention has no bearing on your critical assets.
Question 31 of 37
We determine the gaps in our intelligence and then focus our ______ efforts.
Question 32 of 37
The Client’s schedule is a good example of a
Question 33 of 37
Security detects, deters, delays, responds and
Question 34 of 37
TRUE OR FALSE: The advance person is the least important member on a detail.
Question 35 of 37
TRUE OR FALSE: Well managed physical security is so comprehensive the threat has no bearing, and risk assessments are not necessary.
Question 36 of 37
TRUE OR FALSE: Protecting critical information is of low importance.
Question 37 of 37
TRUE OR FALSE: Knowing what the Adversary knows, what he doesn’t know, and what he would like to know is of limited value.