Access over 20 million homework & study documents
search

HRM 420 Company Security Systems and Employees Questions

Content type

User Generated

Subject

Management

Type

Other

Rating

Showing Page:
1/3
The first step in developing a security system for a company is to perform a ________.
Cost analysis
Surveillance check
Vulnerability analysis
Security check
Feedback
1 / 1 (100.0%)
If an employer restricted the movement of a suspected thief and detained this person for an
unreasonable length of time, the employer could be charged with ________.
Assault and battery
Defamation
Invasion of privacy
False imprisonment
Feedback
1 / 1 (100.0%)
According to signal detection theory, what happens when there is an actual threat and no
action is taken?
A security breach
A true miss
A false alarm
A detection violation
Feedback
1 / 1 (100.0%)
According to signal detection theory, a true miss occurs when ________.
An officer takes action when there is no threat
An officer takes action when there is a threat
An officer takes no action when there is a threat

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/3
An officer takes no action when there is no threat
Feedback
1 / 1 (100.0%)
Federal law prohibits the use of polygraph exams for ________.
Selecting new employees for security firms
Hiring applicants for jobs in the retail industry
Hiring people who will handle controlled substances
Investigating instances of employee theft
Feedback
1 / 1 (100.0%)
When are employers allowed to monitor the telephone calls of their employees?
To document excessive personal phone usage or the misuse of phone privileges
To confirm suspicions that employees are violating company rules or planning to leave
When the calls are secretly recorded to prevent misrepresentation
When they are evaluating their job performance on job-related calls
Feedback
1 / 1 (100.0%)
The most effective method of preventing computer breaches via the Internet is to use
________.
A modem alarm
Licensed software
A firewall
A virus detector
Feedback
1 / 1 (100.0%)

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/3

Sign up to view the full document!

lock_open Sign Up

Unformatted Attachment Preview

• The first step in developing a security system for a company is to perform a ________. • • • • Cost analysis Surveillance check Vulnerability analysis Security check Feedback 1 / 1 (100.0%) • If an employer restricted the movement of a suspected thief and detained this person for an unreasonable length of time, the employer could be charged with ________. • • • • Assault and battery Defamation Invasion of privacy False imprisonment Feedback 1 / 1 (100.0%) • According to signal detection theory, what happens when there is an actual threat and no action is taken? • • • • A security breach A true miss A false alarm A detection violation Feedback 1 / 1 (100.0%) • According to signal detection theory, a true miss occurs when ________. • • • An officer takes action when there is no threat An officer takes action when there is a threat An officer t ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4