Professional Documents
Culture Documents
Business & Security Principles - Sample CPP Questions
Business & Security Principles - Sample CPP Questions
Principles and
Practices
a. Unity of command
b. Supervisory limits
c. Span of control
d. Line of discipline
1. One supervisor can
effectively control only a limited
number of people and that limit
should not be exceeded. This
principle is called:
a. Unity of command
b. Supervisory limits
c. Span of control
d. Line of discipline
2. An important principle of
organization is that an employee
should be under the direct control
of one and only one immediate
supervisor. This principle is :
a. Unity of command
b. Supervisory limits
c. Span of control
d. Line of discipline
2. An important principle of
organization is that an employee
should be under the direct control
of one and only one immediate
supervisor. This principle is :
a. Unity of command
b. Supervisory limits
c. Span of control
d. Line of discipline
3. From an organizational
standpoint, the head of security
should report to:
a. Superintendent of buildings
b. Manager of buildings and grounds
c. Head housekeeper
d. A vice-president or higher
3. From an organizational
standpoint, the head of security
should report to:
a. Superintendent of buildings
b. Manager of buildings and grounds
c. Head housekeeper
d. A vice-president or higher
4. The most conspicuous role of
the security department in any
organization is that of:
a. Educational services
b. Management services
c. Special services
d. Protective services
4. The most conspicuous role of
the security department in any
organization is that of:
a. Educational services
b. Management services
c. Special services
d. Protective services
5. Training sessions consisting
of a security awareness program
for new employees should be
conducted by:
a. “Blind ad”
b. Open advertisement in newspaper
c. Advertisement in trade journal
d. By word of mouth on selective basis
9. In non-entry level recruiting, the
recommended technique is:
a. “Blind ad”
b. Open advertisement in newspaper
c. Advertisement in trade journal
d. By word of mouth on selective basis
10. Every applicant’s first interview
should be with:
a. Polygraph test
b. Review of application
c. Interview
d. Background investigation
11. The heart of personnel selection
is:
a. Polygraph test
b. Review of application
c. Interview
d. Background investigation
12. Which of the following is not
recommended policy with regard
to security manuals?
a. It must be updated on a regular basis
b. Employees should not be allowed to
have possession of it
c. The manual should be put in the hands
of all regular security personnel
d. It should include procedural instructions
for specific incidents
12. Which of the following is not
recommended policy with regard
to security manuals?
a. It must be updated on a regular basis
b. Employees should not be allowed to
have possession of it
c. The manual should be put in the hands
of all regular security personnel
d. It should include procedural instructions
for specific incidents
13. Discipline is primarily the
responsibility of:
a. The supervisor
b. The employee
c. The security manager or director
d. The inspection division
13. Discipline is primarily the
responsibility of:
a. The supervisor
b. The employee
c. The security manager or director
d. The inspection division
14. Among classical theories of
human behavior in the work
environment, one emphasizes
negative aspects of employee
behavior which is known as:
a. The autocrat theory
b. The custodial theory
c. The supportive theory
d. McGregor’s “Theory X”
14. Among classical theories of
human behavior in the work
environment, one emphasizes
negative aspects of employee
behavior which is known as:
a. The autocrat theory
b. The custodial theory
c. The supportive theory
d. McGregor’s “Theory X”
15. Among classical theories of
human behavior in the work
environment is one which suggests
that employees do not inherently
dislike work and will actually seek
responsibility and better performance
if encouraged to do so. It is known as:
a. McGregor’s “Theory Y”
b. McGregor’s “Theory X”
c. The supportive theory
d. The motivation theory
15. Among classical theories of
human behavior in the work
environment is one which suggests
that employees do not inherently
dislike work and will actually seek
responsibility and better performance
if encouraged to do so. It is known as:
a. McGregor’s “Theory Y”
b. McGregor’s “Theory X”
c. The supportive theory
d. The motivation theory
16. Dr. Frederick Herzberg developed
a position that motivation comes from
work itself, not from those factors
such as salary and job security. This
theory is known as:
a. The supportive theory
b. The work motivation theory
c. The custodial theory
d. McGregor’s “Theory X”
16. Dr. Frederick Herzberg developed
a position that motivation comes from
work itself, not from those factors
such as salary and job security. This
theory is known as:
a. The supportive theory
b. The work motivation theory
c. The custodial theory
d. McGregor’s “Theory X”
17. Which of the following is not
an advantage of using in-house
(career) personnel?
a. Career personnel develop a loyalty to the
department
b. Career personnel tend to be more
ambitious
c. There is more stability among career
personnel
d. Career personnel constitute a fixed, limited
cadre or pool of manpower resources
17. Which of the following is not
an advantage of using in-house
(career) personnel?
a. Career personnel develop a loyalty to the
department
b. Career personnel tend to be more
ambitious
c. There is more stability among career
personnel
d. Career personnel constitute a fixed,
limited cadre or pool of manpower
resources
18. Which of the following is
known to be one of the
disadvantages of contract
security services?
a. Turnover
b. Cost
c. Manpower resource
d. Skills
18. Which of the following is
known to be one of the
disadvantages of contract
security services?
a. Turnover
b. Cost
c. Manpower resource
d. Skills
19. Ideally, the person who should
conduct the inspection of a
security department is:
a. An outside consultant
b. The second ranking person
c. The security director or security
manager
d. The ranking sergeant
19. Ideally, the person who should
conduct the inspection of a
security department is:
a. An outside consultant
b. The second ranking person
c. The security director or security
manager
d. The ranking sergeant
20. The process of determining
the probability and cost of
potential loss is known as:
a. Probability analysis
b. Risk assessment
c. Potential loss analysis
d. Physical survey
20. The process of determining
the probability and cost of
potential loss is known as:
a. Probability analysis
b. Risk assessment
c. Potential loss analysis
d. Physical survey
21. In conducting background
investigations, it is good
policy to:
a. The president
b. Chairman of the board
c. Security director
d. The line supervisor
22. The ultimate responsibility
for the internal security in a
department should rest with:
a. The president
b. Chairman of the board
c. Security director
d. The line supervisor
23. The behavioral scientist
whose key concept is that every
executive relates to his
subordinates on the basis of a set
of assumptions termed theory X
and theory Y was formulated by:
a. Abraham Maslow
b. Douglas McGregor
c. Warren Bennis
d. B.F. Skinner
23. The behavioral scientist
whose key concept is that every
executive relates to his
subordinates on the basis of a set
of assumptions termed theory X
and theory Y was formulated by:
a. Abraham Maslow
b. Douglas McGregor
c. Warren Bennis
d. B.F. Skinner
24. The issuance of weapons to
guards is usually not justified:
a. Lock control
b. Barrier control
c. Disaster management
d. Loss control
29. Which of the following is
considered to be one of the 3
basic functions of risk
management?
a. Lock control
b. Barrier control
c. Disaster management
d. Loss control
30. Oscar Neuman published a
classic in which he presented ideas
and applied strategies from the New
York public housing project to aid in
reducing the risk of being victimized
and reducing fear of crime when on
the streets. What is the name of this
book?
a. Crime Prevention
b. Crime Reduction
c. Defensible Space
d. Crime in Architectural Planning
30. Oscar Neuman published a
classic in which he presented ideas
and applied strategies from the New
York public housing project to aid in
reducing the risk of being victimized
and reducing fear of crime when on
the streets. What is the name of this
book?
a. Crime Prevention
b. Crime Reduction
c. Defensible Space
d. Crime in Architectural Planning
31. From a security perspective,
what is the first factor to be
considered in facility
construction?
a. Sickness in family
b. To feed a drug habit
c. To live on a higher level
d. The theft triangle
35. A simplified answer to the
question of why employees steal is:
a. Sickness in family
b. To feed a drug habit
c. To live on a higher level
d. The theft triangle
36. Many experts agree that the
most important deterrent to internal
theft is:
a. Threat of dismissal
b. Fear of discovery
c. Threat of prosecution
d. Conscience pangs
36. Many experts agree that the
most important deterrent to internal
theft is:
a. Threat of dismissal
b. Fear of discovery
c. Threat of prosecution
d. Conscience pangs
37. Crime analysis is a key
element in focusing the use of
police and security resources to
address crime problems. Data
collection and analysis are two
specific steps. The other two are:
a. Shoplifting
b. Shrinkage
c. Internal Theft
d. Pilferage
44. The greatest ongoing threat to
any business is:
a. Shoplifting
b. Shrinkage
c. Internal Theft
d. Pilferage
45. Pilferage is defined as stealing
in small quantities over a long
period of time. The taking of
property entrusted to someone’s
care is called:
a. Mistake of fact
b. Misprison of a felony
c. Uttering
d. Embezzlement
45. Pilferage is defined as stealing
in small quantities over a long
period of time. The taking of
property entrusted to someone’s
care is called:
a. Mistake of fact
b. Misprison of a felony
c. Uttering
d. Embezzlement
46. The theft triangle consists of
the following components:
a. Effective Management
b. Evaluation Techniques
c. Planning
d. Budgeting
49. The activity concerned with
proposals for the future, an
analysis of these proposals and
method for achieving them is
known as:
a. Effective Management
b. Evaluation Techniques
c. Planning
d. Budgeting
50. A key element in focusing the
use of police and security
resources to address crime
problems is commonly called:
a. Barbiturates
b. Mescaline
c. Chloral Hydrate
d. Codeine
61. Most of this substance is
produced from morphine; but it is often
combined with other products such as
aspirin or Tylenol. It is often used for
the relief of coughs; and it is by far the
most widely used natural occurring
narcotic in medical treatment. It is:
a. Barbiturates
b. Mescaline
c. Chloral Hydrate
d. Codeine
62. German scientists synthesized
methadone during World War II
because of a shortage of morphine.
Which of the following is not
characteristic of methadone and it’s
usage ?
a. Although chemically unlike morphine and
heroin, it produces many of the same
effects
b. It was distributed under such names as
amidone, dolophine, and methadone
c. It was widely used in the 1960’s in the
treatment of narcotic addicts.
d. It is only effective when administered by
injection
62. German scientists synthesized
methadone during World War II
because of a shortage of morphine.
Which of the following is not
characteristic of methadone and it’s
usage ?
a. Although chemically unlike morphine and
heroin, it produces many of the same effects
b. It was distributed under such names as
amidone, dolophine, and methadone
c. It was widely used in the 1960’s in the
treatment of narcotic addicts.
d. It is only effective when administered by
injection
63. Which of the following
characteristics do not pertain to the use
or effects of depressants generally?
a. The usual methods of administration are oral
or injected.
b. Excessive use results in drunken behavior
similar to that of alcohol
c. There is no danger of tolerance developing
d. Taken as prescribed, they may be beneficial
for the relief of anxiety and tension
63. Which of the following
characteristics do not pertain to the use
or effects of depressants generally?
b. Amphetamines
c. Phenmetrazine
d. Mescaline
65. All of the following are controlled
substances grouped as stimulants
except one. Identify the exception.
a. Cocaine
b. Amphetamines
c. Phenmetrazine
d. Mescaline
66. All of the following are factual
statements descriptive of illicit
cocaine except one, which is:
a. Adipex
b. Bacarate
c. Piegine
d. Snow
67. Which of the following is
another name for cocaine ?
a. Adipex
b. Bacarate
c. Piegine
d. Snow
68. Which of the following
statements does not pertain to
cocaine ?
a. It has a medical use as a sedative
a. Cannabis
b. Hallucinogen
c. Stimulants
d. Depressants
69. The effects of illusions and
hallucinations with poor perception of
time and distance possibly indicates
the use of which of the following
substances ?
a. Cannabis
b. Hallucinogen
c. Stimulants
d. Depressants
70. All of the following are
hallucinogens except:
a. LSD
b. Marihuana
c. Mescaline
d. Phencyclidine
70. All of the following are
hallucinogens except:
a. LSD
b. Marihuana
c. Mescaline
d. Phencyclidine
71. The source of marihuana is the:
a. Peyote cactus
b. Mushrooms
c. Coca plant
d. Cannabis plant
71. The source of marihuana is the:
a. Peyote cactus
b. Mushrooms
c. Coca plant
d. Cannabis plant
72. Cannabis products are usually
taken:
a. Through sniffing
b. Injection
c. Smoking
a. Through sniffing
b. Injection
c. Smoking
b. Addiction
c. Habituation
d. Drug dependence
74. The state of periodic or chronic
intoxication produced by the repeated
consumption of a substance is known
as:
a. Tolerance
b. Addiction
c. Habituation
d. Drug dependence
Business/Security Principles and Practices
The End