You are on page 1of 150

Business/Security

Principles and
Practices

Sample CPP Exam Questions


1. One supervisor can
effectively control only a limited
number of people and that limit
should not be exceeded. This
principle is called:

 a. Unity of command
 b. Supervisory limits
 c. Span of control
 d. Line of discipline
1. One supervisor can
effectively control only a limited
number of people and that limit
should not be exceeded. This
principle is called:

 a. Unity of command
 b. Supervisory limits
 c. Span of control
 d. Line of discipline
2. An important principle of
organization is that an employee
should be under the direct control
of one and only one immediate
supervisor. This principle is :
 a. Unity of command
 b. Supervisory limits
 c. Span of control
 d. Line of discipline
2. An important principle of
organization is that an employee
should be under the direct control
of one and only one immediate
supervisor. This principle is :
 a. Unity of command
 b. Supervisory limits
 c. Span of control
 d. Line of discipline
3. From an organizational
standpoint, the head of security
should report to:
 a. Superintendent of buildings
 b. Manager of buildings and grounds
 c. Head housekeeper
 d. A vice-president or higher
3. From an organizational
standpoint, the head of security
should report to:
 a. Superintendent of buildings
 b. Manager of buildings and grounds
 c. Head housekeeper
 d. A vice-president or higher
4. The most conspicuous role of
the security department in any
organization is that of:

 a. Educational services
 b. Management services
 c. Special services
 d. Protective services
4. The most conspicuous role of
the security department in any
organization is that of:

 a. Educational services
 b. Management services
 c. Special services
 d. Protective services
5. Training sessions consisting
of a security awareness program
for new employees should be
conducted by:

 a. Special training officers


 b. Security personnel
 c. Consultants skilled in training
 d. Member of management
5. Training sessions consisting
of a security awareness program
for new employees should be
conducted by:

 a. Special training officers


 b. Security personnel
 c. Consultants skilled in training
 d. Member of management
6. There are necessary and
legitimate exceptions to the principle
of unity of command. One condition
which sometimes allows for shifting in
supervision is:

 a. When order is given by the rank of captain or


above
 b. When order is given by the head of a department
 c. When the order is given by the head of internal
affairs
 d. During emergencies
6. There are necessary and
legitimate exceptions to the principle
of unity of command. One condition
which sometimes allows for shifting in
supervision is:
 a. When order is given by the rank of captain or
above
 b. When order is given by the head of a department
 c. When the order is given by the head of internal
affairs
 d. During emergencies
7. Perhaps the most common
shortcoming in the security industry
is:

 a. Lack of support by top management


 b. Failure to properly prepare and equip
new supervisors with tools to
discharge their important responsibilities
(supervisor training)
 c. Lack of planning
 d. Lack of monetary resources
7. Perhaps the most common
shortcoming in the security industry
is:

 a. Lack of support by top management


 b. Failure to properly prepare and equip
new supervisors with tools to
discharge their important responsibilities
(supervisor training)
 c. Lack of planning
 d. Lack of monetary resources
8. As a rule, which department
of the company administers the
recruiting activity?

 a. The security department


 b. Administrative department
 c. Personnel department
 d. Internal affairs
8. As a rule, which department
of the company administers the
recruiting activity?

 a. The security department


 b. Administrative department
 c. Personnel department
 d. Internal affairs
9. In non-entry level recruiting, the
recommended technique is:

 a. “Blind ad”
 b. Open advertisement in newspaper
 c. Advertisement in trade journal
 d. By word of mouth on selective basis
9. In non-entry level recruiting, the
recommended technique is:

 a. “Blind ad”
 b. Open advertisement in newspaper
 c. Advertisement in trade journal
 d. By word of mouth on selective basis
10. Every applicant’s first interview
should be with:

 a. The security manager director


 b. The security supervisor
 c. A security line employee
 d. A personnel interviewer
10. Every applicant’s first interview
should be with:

 a. The security manager director


 b. The security supervisor
 c. A security line employee
 d. A personnel interviewer
11. The heart of personnel selection
is:

 a. Polygraph test
 b. Review of application
 c. Interview
 d. Background investigation
11. The heart of personnel selection
is:

 a. Polygraph test
 b. Review of application
 c. Interview
 d. Background investigation
12. Which of the following is not
recommended policy with regard
to security manuals?
 a. It must be updated on a regular basis
 b. Employees should not be allowed to
have possession of it
 c. The manual should be put in the hands
of all regular security personnel
 d. It should include procedural instructions
for specific incidents
12. Which of the following is not
recommended policy with regard
to security manuals?
 a. It must be updated on a regular basis
 b. Employees should not be allowed to
have possession of it
 c. The manual should be put in the hands
of all regular security personnel
 d. It should include procedural instructions
for specific incidents
13. Discipline is primarily the
responsibility of:

 a. The supervisor
 b. The employee
 c. The security manager or director
 d. The inspection division
13. Discipline is primarily the
responsibility of:

 a. The supervisor
 b. The employee
 c. The security manager or director
 d. The inspection division
14. Among classical theories of
human behavior in the work
environment, one emphasizes
negative aspects of employee
behavior which is known as:
 a. The autocrat theory
 b. The custodial theory
 c. The supportive theory
 d. McGregor’s “Theory X”
14. Among classical theories of
human behavior in the work
environment, one emphasizes
negative aspects of employee
behavior which is known as:
 a. The autocrat theory
 b. The custodial theory
 c. The supportive theory
 d. McGregor’s “Theory X”
15. Among classical theories of
human behavior in the work
environment is one which suggests
that employees do not inherently
dislike work and will actually seek
responsibility and better performance
if encouraged to do so. It is known as:

 a. McGregor’s “Theory Y”
 b. McGregor’s “Theory X”
 c. The supportive theory
 d. The motivation theory
15. Among classical theories of
human behavior in the work
environment is one which suggests
that employees do not inherently
dislike work and will actually seek
responsibility and better performance
if encouraged to do so. It is known as:

 a. McGregor’s “Theory Y”
 b. McGregor’s “Theory X”
 c. The supportive theory
 d. The motivation theory
16. Dr. Frederick Herzberg developed
a position that motivation comes from
work itself, not from those factors
such as salary and job security. This
theory is known as:
 a. The supportive theory
 b. The work motivation theory
 c. The custodial theory
 d. McGregor’s “Theory X”
16. Dr. Frederick Herzberg developed
a position that motivation comes from
work itself, not from those factors
such as salary and job security. This
theory is known as:
 a. The supportive theory
 b. The work motivation theory
 c. The custodial theory
 d. McGregor’s “Theory X”
17. Which of the following is not
an advantage of using in-house
(career) personnel?
 a. Career personnel develop a loyalty to the
department
 b. Career personnel tend to be more
ambitious
 c. There is more stability among career
personnel
 d. Career personnel constitute a fixed, limited
cadre or pool of manpower resources
17. Which of the following is not
an advantage of using in-house
(career) personnel?
 a. Career personnel develop a loyalty to the
department
 b. Career personnel tend to be more
ambitious
 c. There is more stability among career
personnel
 d. Career personnel constitute a fixed,
limited cadre or pool of manpower
resources
18. Which of the following is
known to be one of the
disadvantages of contract
security services?

 a. Turnover
 b. Cost
 c. Manpower resource
 d. Skills
18. Which of the following is
known to be one of the
disadvantages of contract
security services?

 a. Turnover
 b. Cost
 c. Manpower resource
 d. Skills
19. Ideally, the person who should
conduct the inspection of a
security department is:

 a. An outside consultant
 b. The second ranking person
 c. The security director or security
manager
 d. The ranking sergeant
19. Ideally, the person who should
conduct the inspection of a
security department is:

 a. An outside consultant
 b. The second ranking person
 c. The security director or security
manager
 d. The ranking sergeant
20. The process of determining
the probability and cost of
potential loss is known as:

 a. Probability analysis
 b. Risk assessment
 c. Potential loss analysis
 d. Physical survey
20. The process of determining
the probability and cost of
potential loss is known as:

 a. Probability analysis
 b. Risk assessment
 c. Potential loss analysis
 d. Physical survey
21. In conducting background
investigations, it is good
policy to:

 a. Not let prospective employee know


investigation is being conducted
 b. Restrict investigation to “confidential”
records checks
 c. Restrict investigation to employment
checks
 d. Advise applicant of forthcoming
investigation and secure his permission
21. In conducting background
investigations, it is good
policy to:

 a. Not let prospective employee know


investigation is being conducted
 b. Restrict investigation to “confidential”
records checks
 c. Restrict investigation to employment
checks
 d. Advise applicant of forthcoming
investigation and secure his
permission
22. The ultimate responsibility
for the internal security in a
department should rest with:

 a. The president
 b. Chairman of the board
 c. Security director
 d. The line supervisor
22. The ultimate responsibility
for the internal security in a
department should rest with:

 a. The president
 b. Chairman of the board
 c. Security director
 d. The line supervisor
23. The behavioral scientist
whose key concept is that every
executive relates to his
subordinates on the basis of a set
of assumptions termed theory X
and theory Y was formulated by:

 a. Abraham Maslow
 b. Douglas McGregor
 c. Warren Bennis
 d. B.F. Skinner
23. The behavioral scientist
whose key concept is that every
executive relates to his
subordinates on the basis of a set
of assumptions termed theory X
and theory Y was formulated by:

 a. Abraham Maslow
 b. Douglas McGregor
 c. Warren Bennis
 d. B.F. Skinner
24. The issuance of weapons to
guards is usually not justified:

 a. In a situation where deterrence is needed


in handling control of large amounts of cash
 b. In situations in which terrorism is a real
threat
 c. In situations where there would be greater
danger to life without weapons than with
them
 d. In a situation where there is no danger to
life safety
24. The issuance of weapons to
guards is usually not justified:
 a. In a situation where deterrence is needed
in handling control of large amounts of cash
 b. In situations in which terrorism is a real
threat
 c. In situations where there would be greater
danger to life without weapons than with
them
 d. In a situation where there is no danger to
life safety
25. In issuing policy statements
regarding the handling of
disturbed persons, the primary
consideration is:
 a. Legal liability to the disturbed
 b. Reducing the disturbed person to a form of
benevolent custody and eliminating the
immediate danger
 c. Legal liability to employees and third persons
if restraint not achieved
 d. Employee-community public relations
25. In issuing policy statements
regarding the handling of
disturbed persons, the primary
consideration is:
 a. Legal liability to the disturbed
 b. Reducing the disturbed person to a form of
benevolent custody and eliminating the
immediate danger
 c. Legal liability to employees and third persons
if restraint not achieved
 d. Employee-community public relations
26. Spotting the individual loss
events that might take place is the
primary step in dealing with
security vulnerability. This
process is called

 a. Loss event probability


 b. Threat assessment process
 c. Loss event profile
 d. Actual threat analysis
26. Spotting the individual loss
events that might take place is the
primary step in dealing with
security vulnerability. This
process is called

 a. Loss event probability


 b. Threat assessment process
 c. Loss event profile
 d. Actual threat analysis
27. The likelihood or probability of
risks affecting the assets
becoming actual loss events is
known as:
 a. Loss event probability
 b. Loss event profile
 c. Threat analysis control
 d. Threat target control
27. The likelihood or probability of
risks affecting the assets
becoming actual loss events is
known as:
 a. Loss event probability
 b. Loss event profile
 c. Threat analysis control
 d. Threat target control
28. The impact or effect on the
enterprise if the loss occurs is
known as:

 a. Loss event profile


 b. Loss event probability
 c. Loss event criticality
 d. Security survey analysis
28. The impact or effect on the
enterprise if the loss occurs is
known as:

 a. Loss event profile


 b. Loss event probability
 c. Loss event criticality
 d. Security survey analysis
29. Which of the following is
considered to be one of the 3
basic functions of risk
management?

 a. Lock control
 b. Barrier control
 c. Disaster management
 d. Loss control
29. Which of the following is
considered to be one of the 3
basic functions of risk
management?

 a. Lock control
 b. Barrier control
 c. Disaster management
 d. Loss control
30. Oscar Neuman published a
classic in which he presented ideas
and applied strategies from the New
York public housing project to aid in
reducing the risk of being victimized
and reducing fear of crime when on
the streets. What is the name of this
book?

 a. Crime Prevention
 b. Crime Reduction
 c. Defensible Space
 d. Crime in Architectural Planning
30. Oscar Neuman published a
classic in which he presented ideas
and applied strategies from the New
York public housing project to aid in
reducing the risk of being victimized
and reducing fear of crime when on
the streets. What is the name of this
book?

 a. Crime Prevention
 b. Crime Reduction
 c. Defensible Space
 d. Crime in Architectural Planning
31. From a security perspective,
what is the first factor to be
considered in facility
construction?

 a. The identity of experienced consultants


 b. An effective security plan
 c. An architect with knowledge of physical
security
 d. The building site itself
31. From a security perspective,
what is the first factor to be
considered in facility
construction?
 a. The identity of experienced consultants
 b. An effective security plan
 c. An architect with knowledge of physical
security
 d. The building site itself
32. A critical on-site examination and
analysis of an industrial plant
business, home or public or private
institution to ascertain the present
security status, to identify
deficiencies or excesses to determine
the protection needed to make
recommendations to improve the
overall security is the definition of :
 a. Security survey
 b. Risk analysis
 c. Full-field inspection
 d. Crime prevention assessment
32. A critical on-site examination and
analysis of an industrial plant
business, home or public or private
institution to ascertain the present
security status, to identify
deficiencies or excesses to determine
the protection needed to make
recommendations to improve the
overall security is the definition of :
 a. Security survey
 b. Risk analysis
 c. Full-field inspection
 d. Crime prevention assessment
33. There are two generally
accepted definitions of risk.
These are more commonly known
to risk managers and security
officers as:
 a. Potential risk and dynamic risk
 b. Profit risk and dynamic risk
 c. Potential risk and pure risk
 d. Pure risk and dynamic risk
33. There are two generally
accepted definitions of risk.
These are more commonly known
to risk managers and security
officers as:
 a. Potential risk and dynamic risk
 b. Profit risk and dynamic risk
 c. Potential risk and pure risk
 d. Pure risk and dynamic risk
34. The most effective deterrent to
shoplifting is:

 a. Highly competent and educated security


officers
 b. Widespread use of sensor devices
 c. Well positioned CCTV’s
 d. Well trained personnel
34. The most effective deterrent to
shoplifting is:

 a. Highly competent and educated security


officers
 b. Widespread use of sensor devices
 c. Well positioned CCTV’s
 d. Well trained personnel
35. A simplified answer to the
question of why employees steal is:

 a. Sickness in family
 b. To feed a drug habit
 c. To live on a higher level
 d. The theft triangle
35. A simplified answer to the
question of why employees steal is:

 a. Sickness in family
 b. To feed a drug habit
 c. To live on a higher level
 d. The theft triangle
36. Many experts agree that the
most important deterrent to internal
theft is:

 a. Threat of dismissal
 b. Fear of discovery
 c. Threat of prosecution
 d. Conscience pangs
36. Many experts agree that the
most important deterrent to internal
theft is:

 a. Threat of dismissal
 b. Fear of discovery
 c. Threat of prosecution
 d. Conscience pangs
37. Crime analysis is a key
element in focusing the use of
police and security resources to
address crime problems. Data
collection and analysis are two
specific steps. The other two are:

 a. Inspection and discovery of facts


 b. Response and feedback
 c. Feedback and corrective action
 d. Dissemination and feedback
37. Crime analysis is a key
element in focusing the use of
police and security resources to
address crime problems. Data
collection and analysis are two
specific steps. The other two are:

 a. Inspection and discovery of facts


 b. Response and feedback
 c. Feedback and corrective action
 d. Dissemination and feedback
38. It is generally accepted that
insurance rates are dependent
upon two primary variables.
These are:

 a. Cost of claims and competitors rates


 b. Competition among insurance companies
and frequency of claims
 c. Cost of claims and frequency of claims
 d. Cost of claims and government regulations
38. It is generally accepted that
insurance rates are dependent
upon two primary variables.
These are:

 a. Cost of claims and competitors rates


 b. Competition among insurance companies
and frequency of claims
 c. Cost of claims and frequency of claims
 d. Cost of claims and government regulations
39. The basic types of protection
which security personnel realize
as best can be described by the
following:
 a. Fidelity Bonds
 b. Surety Bonds
 c. Burglary/Robbery/Theft Insurance
 d. All of the above
39. The basic types of protection
which security personnel realize
as best can be described by the
following:
 a. Fidelity Bonds
 b. Surety Bonds
 c. Burglary/Robbery/Theft Insurance
 d. All of the above
40. Bonds which require that an
employee be investigated by the
bonding company to limit the risk
of dishonesty, and if that trust is
violated, the insurance company
must indemnify the employer, are
called:
 a. Surety Bonds
 b. Fidelity Bonds
 c. Insurance Bonds
 d. Blanket Bonds
40. Bonds which require that an
employee be investigated by the
bonding company to limit the risk
of dishonesty, and if that trust is
violated, the insurance company
must indemnify the employer, are
called:
 a. Surety Bonds
 b. Fidelity Bonds
 c. Insurance Bonds
 d. Blanket Bonds
41. Protection for a corporation,
if there is a failure to perform
specified acts within a certain
period of time, is known as a:
 a. Contract Bond
 b. Blanket Bond
 c. Surety Bond
 d. Fiduciary Bond
41. Protection for a corporation,
if there is a failure to perform
specified acts within a certain
period of time, is known as a:
 a. Contract Bond
 b. Blanket Bond
 c. Surety Bond
 d. Fiduciary Bond
42. The urban planning and design
process which integrates crime
prevention techniques with
neighborhood design is known as:
 a. Urban Development Planning
 b. Conceptual Modeling in Architecture
 c. Environmental Design
 d. Environmental Security (E/S)
42. The urban planning and design
process which integrates crime
prevention techniques with
neighborhood design is known as:
 a. Urban Development Planning
 b. Conceptual Modeling in Architecture
 c. Environmental Design
 d. Environmental Security (E/S)
43. The ability of design to
counteract the perception that the
area is isolated and criminally
vulnerable is known as:

 a. Natural Surveillance Techniques


 b. Image and Milieu
 c. Soft Area Protection
 d. Territorial Cleansing
43. The ability of design to
counteract the perception that the
area is isolated and criminally
vulnerable is known as:

 a. Natural Surveillance Techniques


 b. Image and Milieu
 c. Soft Area Protection
 d. Territorial Cleansing
44. The greatest ongoing threat to
any business is:

 a. Shoplifting
 b. Shrinkage
 c. Internal Theft
 d. Pilferage
44. The greatest ongoing threat to
any business is:

 a. Shoplifting
 b. Shrinkage
 c. Internal Theft
 d. Pilferage
45. Pilferage is defined as stealing
in small quantities over a long
period of time. The taking of
property entrusted to someone’s
care is called:

 a. Mistake of fact
 b. Misprison of a felony
 c. Uttering
 d. Embezzlement
45. Pilferage is defined as stealing
in small quantities over a long
period of time. The taking of
property entrusted to someone’s
care is called:

 a. Mistake of fact
 b. Misprison of a felony
 c. Uttering
 d. Embezzlement
46. The theft triangle consists of
the following components:

 a. Desire, skill and training


 b. Motivation, skill and opportunity
 c. Opportunity, desire and skill
 d. Motivation, opportunity and
rationalization (Desire)
46. The theft triangle consists of
the following components:

 a. Desire, skill and training


 b. Motivation, skill and opportunity
 c. Opportunity, desire and skill
 d. Motivation, opportunity and
rationalization (Desire)
47. A line item budget is the
traditional and most frequently
used method of budgeting. Two
other commonly used budgeting
techniques include:
 a. Management and program budgets
 b. Capital and program budgets
 c. Program and exception item
budgets
 d. Fund allocation and capital budgets
47. A line item budget is the
traditional and most frequently
used method of budgeting. Two
other commonly used budgeting
techniques include:
 a. Management and program budgets
 b. Capital and program budgets
 c. Program and exception item
budgets
 d. Fund allocation and capital budgets
48. A management tool wherein
there is a systematic method of
achieving agreed upon goals set
in advance is known as :
 a. Matrix Management
 b. Proactive Management
 c. Scheduling Management
 d. Management by Objective
48. A management tool wherein
there is a systematic method of
achieving agreed upon goals set
in advance is known as :
 a. Matrix Management
 b. Proactive Management
 c. Scheduling Management
 d. Management by Objective
49. The activity concerned with
proposals for the future, an
analysis of these proposals and
method for achieving them is
known as:

 a. Effective Management
 b. Evaluation Techniques
 c. Planning
 d. Budgeting
49. The activity concerned with
proposals for the future, an
analysis of these proposals and
method for achieving them is
known as:

 a. Effective Management
 b. Evaluation Techniques
 c. Planning
 d. Budgeting
50. A key element in focusing the
use of police and security
resources to address crime
problems is commonly called:

 a. Data collection and analysis


 b. Systematic evaluation of data
available
 c. Crime analysis
 d. Analysis and feedback
50. A key element in focusing the
use of police and security
resources to address crime
problems is commonly called:

 a. Data collection and analysis


 b. Systematic evaluation of data
available
 c. Crime analysis
 d. Analysis and feedback
51. According to estimates, about 1/3
of all business failures are caused by:

 a. Thefts by outsiders (non-


employees)
 b. Thefts by employees
 c. Mismanagement
 d. Poor quality of product
51. According to estimates, about 1/3
of all business failures are caused by:

 a. Thefts by outsiders (non-


employees)
 b. Thefts by employees
 c. Mismanagement
 d. Poor quality of product
52. The major item
conspicuously absent from
police-based crime prevention
programs was:
 a. Comprehensive training program
 b. Manpower dedicated to crime
prevention concepts
 c. The input of huge number of persons
employed in private security
 d. Use of up-dated technology
52. The major item
conspicuously absent from
police-based crime prevention
programs was:
 a. Comprehensive training program
 b. Manpower dedicated to crime
prevention concepts
 c. The input of huge number of persons
employed in private security
 d. Use of up-dated technology
53. What was the most frequent
recommendation made by both law
enforcement and security managers to
improve private security and their working
relationships with police?

 a. Higher entry-level pay


 b. Upgrading quality of security personnel
 c. A planned educational program involving
both police and private security
 d. Requirement of being armed
53. What was the most frequent
recommendation made by both law
enforcement and security managers to
improve private security and their working
relationships with police?

 a. Higher entry-level pay


 b. Upgrading quality of security personnel
 c. A planned educational program involving
both police and private security
 d. Requirement of being armed
54. The most frequently shared
resource between law
enforcement and private security
is:
 a. CCTV and other surveillance equipment
 b. Personnel
 c. “Buy money” for stolen goods
 d. Reward money
54. The most frequently shared
resource between law
enforcement and private security
is:
 a. CCTV and other surveillance equipment
 b. Personnel
 c. “Buy money” for stolen goods
 d. Reward money
55. The main objective of private
security is:
 a. To apprehend those who steal property
from their firms
 b. To protect assets and prevent losses
 c. To assist police in investigations of
crimes
 d. To prevent unauthorized persons entry
on firm’s property
55. The main objective of private
security is:
 a. To apprehend those who steal property
from their firms
 b. To protect assets and prevent losses
 c. To assist police in investigations of
crimes
 d. To prevent unauthorized persons entry
on firm’s property
56. What is the most frequently
investigated crime by private
security?
 a. Employee theft
 b. Shoplifting
 c. Bad checks
 d. Embezzlement
56. What is the most frequently
investigated crime by private
security?
 a. Employee theft
 b. Shoplifting
 c. Bad checks
 d. Embezzlement
57. The two major components of
economic crime have been:

 a. Employee theft and corporate


bribery
 b. Fraud and embezzlement
 c. White collar and ordinary crime
 d. Computer and ordinary crime
57. The two major components of
economic crime have been:

 a. Employee theft and corporate


bribery
 b. Fraud and embezzlement
 c. White collar and ordinary crime
 d. Computer and ordinary crime
58. The practice of preventing
unauthorized persons from
gaining information by analyzing
electromagnetic emanations from
electronic equipment is often
termed:
 a. Tempest
 b. Veiling
 c. Bugging
 d. Hardening
58. The practice of preventing
unauthorized persons from
gaining information by analyzing
electromagnetic emanations from
electronic equipment is often
termed:
 a. Tempest
 b. Veiling
 c. Bugging
 d. Hardening
59. Which of the following is not a
correct statement with regard to
narcotics?
 a. The term “narcotic” in it’s medical meaning
refers to opium and opium derivatives or synthetic
substitutes
 b. They are the most effective agents known for the
relief of intense pain
 c. They have been used for a long period of time as a
remedy for diarrhea
 d. They tend to intensify vision and increase alertness
59. Which of the following is not a
correct statement with regard to
narcotics?
 a. The term “narcotic” in it’s medical meaning
refers to opium and opium derivatives or synthetic
substitutes
 b. They are the most effective agents known for the
relief of intense pain
 c. They have been used for a long period of time as a
remedy for diarrhea
 d. They tend to intensify vision and increase alertness
60. Which of the following
characteristics does not pertain to
morphine?
 a. It is the principal constituent of opium
 b. Its legal use is restricted primarily to
hospitals
 c. It tastes sweet and is marketed in the
form of yellow crystals
 d. Tolerance and dependence develop
rapidly
60. Which of the following
characteristics does not pertain to
morphine?
 a. It is the principal constituent of opium
 b. Its legal use is restricted primarily to
hospitals
 c. It tastes sweet and is marketed in the
form of yellow crystals
 d. Tolerance and dependence develop
rapidly
61. Most of this substance is
produced from morphine; but it is often
combined with other products such as
aspirin or Tylenol. It is often used for
the relief of coughs; and it is by far the
most widely used natural occurring
narcotic in medical treatment. It is:

 a. Barbiturates
 b. Mescaline
 c. Chloral Hydrate
 d. Codeine
61. Most of this substance is
produced from morphine; but it is often
combined with other products such as
aspirin or Tylenol. It is often used for
the relief of coughs; and it is by far the
most widely used natural occurring
narcotic in medical treatment. It is:

 a. Barbiturates
 b. Mescaline
 c. Chloral Hydrate
 d. Codeine
62. German scientists synthesized
methadone during World War II
because of a shortage of morphine.
Which of the following is not
characteristic of methadone and it’s
usage ?
 a. Although chemically unlike morphine and
heroin, it produces many of the same
effects
 b. It was distributed under such names as
amidone, dolophine, and methadone
 c. It was widely used in the 1960’s in the
treatment of narcotic addicts.
 d. It is only effective when administered by
injection
62. German scientists synthesized
methadone during World War II
because of a shortage of morphine.
Which of the following is not
characteristic of methadone and it’s
usage ?
 a. Although chemically unlike morphine and
heroin, it produces many of the same effects
 b. It was distributed under such names as
amidone, dolophine, and methadone
 c. It was widely used in the 1960’s in the
treatment of narcotic addicts.
 d. It is only effective when administered by
injection
63. Which of the following
characteristics do not pertain to the use
or effects of depressants generally?
 a. The usual methods of administration are oral
or injected.
 b. Excessive use results in drunken behavior
similar to that of alcohol
 c. There is no danger of tolerance developing
 d. Taken as prescribed, they may be beneficial
for the relief of anxiety and tension
63. Which of the following
characteristics do not pertain to the use
or effects of depressants generally?

 a. The usual methods of administration


are oral or injected.
 b. Excessive use results in drunken
behavior similar to that of alcohol
 c. There is no danger of tolerance
developing
 d. Taken as prescribed, they may be
beneficial for the relief of anxiety and
tension
64. Another widely abused
depressant is methaqualone. All of
the following are factually descriptive
of methaqualone except one. Identify
this exception.

 a. It is chemically unrelated to the


barbiturates
 b. It was once mistakenly thought to be
effective as an aphrodisiac.
 c. It is administered orally
 d. It is one of the depressants that does
not lead to tolerance and dependence.
64. Another widely abused
depressant is methaqualone. All of
the following are factually descriptive
of methaqualone except one. Identify
this exception.

 a. It is chemically unrelated to the


barbiturates
 b. It was once mistakenly thought to be
effective as an aphrodisiac.
 c. It is administered orally
 d. It is one of the depressants that does
not lead to tolerance and dependence.
65. All of the following are controlled
substances grouped as stimulants
except one. Identify the exception.
 a. Cocaine

 b. Amphetamines

 c. Phenmetrazine

 d. Mescaline
65. All of the following are controlled
substances grouped as stimulants
except one. Identify the exception.
 a. Cocaine

 b. Amphetamines

 c. Phenmetrazine

 d. Mescaline
66. All of the following are factual
statements descriptive of illicit
cocaine except one, which is:

 a. It is distributed on the street as a white to dark


brown powder.
 b. It is often adulterated to about half its volume
by a variety of other ingredients.
 c. This substance is only used through the
process of injection
 d. It is popularly accepted as a recreational drug
66. All of the following are factual
statements descriptive of illicit
cocaine except one, which is:

 a. It is distributed on the street as a white to


dark brown powder.
 b. It is often adulterated to about half its
volume by a variety of other ingredients.
 c. This substance is only used through
the process of injection
 d. It is popularly accepted as a recreational
drug
67. Which of the following is
another name for cocaine ?

 a. Adipex

 b. Bacarate

 c. Piegine

 d. Snow
67. Which of the following is
another name for cocaine ?

 a. Adipex

 b. Bacarate

 c. Piegine

 d. Snow
68. Which of the following
statements does not pertain to
cocaine ?
 a. It has a medical use as a sedative

 b. There is a possibility that sustained use


could result in physical dependence

 c. There is a high possibility that sustained use


could result in psychological
dependence

 d. Tolerance is a distinct possibility


68. Which of the following
statements does not pertain to
cocaine ?
 a. It has a medical use as a sedative

 b. There is a possibility that sustained use


could result in physical dependence

 c. There is a high possibility that sustained use


could result in psychological
dependence

 d. Tolerance is a distinct possibility


69. The effects of illusions and
hallucinations with poor perception of
time and distance possibly indicates
the use of which of the following
substances ?

 a. Cannabis

 b. Hallucinogen

 c. Stimulants

 d. Depressants
69. The effects of illusions and
hallucinations with poor perception of
time and distance possibly indicates
the use of which of the following
substances ?

 a. Cannabis

 b. Hallucinogen

 c. Stimulants

 d. Depressants
70. All of the following are
hallucinogens except:

 a. LSD

 b. Marihuana

 c. Mescaline

 d. Phencyclidine
70. All of the following are
hallucinogens except:

 a. LSD

 b. Marihuana

 c. Mescaline

 d. Phencyclidine
71. The source of marihuana is the:

 a. Peyote cactus

 b. Mushrooms

 c. Coca plant

 d. Cannabis plant
71. The source of marihuana is the:

 a. Peyote cactus

 b. Mushrooms

 c. Coca plant

 d. Cannabis plant
72. Cannabis products are usually
taken:

 a. Through sniffing

 b. Injection

 c. Smoking

 d. By rubbing into the skin


72. Cannabis products are usually
taken:

 a. Through sniffing

 b. Injection

 c. Smoking

 d. By rubbing into the skin


73. The condition whereby a user
develops an attachment to the use of
a substance due to it’s ability to
satisfy some emotional or personality
need of the person is known as:
 a. Tolerance
 b. Physical dependence
 c. Addiction
 d. Psychological Dependence
73. The condition whereby a user
develops an attachment to the use of
a substance due to it’s ability to
satisfy some emotional or personality
need of the person is known as:
 a. Tolerance
 b. Physical dependence
 c. Addiction
 d. Psychological Dependence
74. The state of periodic or chronic
intoxication produced by the repeated
consumption of a substance is known
as:
 a. Tolerance

 b. Addiction

 c. Habituation

 d. Drug dependence
74. The state of periodic or chronic
intoxication produced by the repeated
consumption of a substance is known
as:
 a. Tolerance

 b. Addiction

 c. Habituation

 d. Drug dependence
Business/Security Principles and Practices
The End

You might also like