IAHSS QUESTION WITH ANSWERS 2023 for Healthcare Security Personnel 4th Edition
What is the primary role of a security officer in crime prevention? -
... [Show More] correct answers Reduce the opportunity for a person to commit a crime.
Crime prevention is the anticipation, recognition, and appraisal of a crime risk. It also involves what? - correct answers Initiating some action to remove or reduce the risk.
What must be done about life safety deficiencies found in the hazard surveillance tour? - correct answers Correct them immediately.
What is the purpose of crime analysis? - correct answers Identify problems and develop strategies to reduce the problems.
Which of the following is easier and more cost efficient for an institution? - correct answers Building in security systems during the building design.
Healthcare facilities that provide _______________ customer service motivates customers to tell others about these organizations. - correct answers Excellent
Process improvement in customer service can be measured how? - correct answers Surveys, Monitoring Performance, Benchmarking, and Service Standards.
___________ can be an excellent way to measure customer service and improve performance. - correct answers Feedback
What are elements in improving customer service? - correct answers Identify Customers, Attitude, Communication and Training.
Communication is ______________. - correct answers 93% body language and 7% words.
Which legal test takes into account neighborhood crime rates, industry standards, and the owner's experience at other locations? - correct answers Totality of circumstances.
The major source of premise liability in healthcare is from _________ . - correct answers Slips and falls.
Property owners have a _________________ duty to maintain the property in a __________________ condition. - correct answers legal... reasonably safe
What elements are necessary to establish negligence in a premise liability case? - correct answers Duty to the plaintiff, failure to meet the duty and breech of a duty caused an injury.
Which risk factors should security officers identify? - correct answers Burned out lights, breached fence lines and slip and fall hazards.
Failure to conduct routine patrol can ultimately result in what? - correct answers An increase in security spending and a liability exposure.
K-9 patrol teams can be particularly effective in dealing with which situation? - correct answers Emergency department violence.
Bicycle patrol is? - correct answers Faster than foot patrol and a vehicle in heavy traffic.
__________ patrol contributes, more than any other method of patrol, to excessive socialization. - correct answers Foot
Security officers should have a valid driver's license if they are going to do what? - correct answers Operate a motorized vehicle, conduct vehicle patrols on client property or transport authorized personnel.
A security officer responding to a crime scene should do what? - correct answers Respond as quickly as possible, observing all safety practices.
After arriving at a crime scene, what should the security officer do first? - correct answers Protect his or her personal safety.
Which of these is an example of factual evidence? - correct answers Physical evidence.
Which of these should an office follow to be able to testify that the evidence presented has merit? - correct answers Proper chain of custody.
Why are initial information gathering and proper note-taking key to a successful investigation? - correct answers 1) They memorialize information gathered at the scene from those involved. 2) They refresh your memory for later report writing purposes. 3) They are subject to discovery in a criminal case and thus can be subpoenaed.
When dealing with a personal-gain informant, what should the officer do? - correct answers Document the officer's interaction with the informant.
Which of the following is not a recommended guideline when an outside agency conducts an undercover investigation? - correct answers Insist that all security department staff receive operational information.
Before using any covert monitoring devices, the officer should do what? - correct answers Review applicable state and federal laws.
Which of the following are characteristics of a covert or undercover operations protocol? - correct answers 1) Strict, clear and concise. 2) Clearly spells out when covert operations can be performed. 3) Has safeguards in place to prevent improper behavior.
What approach should be followed to determine appropriate protective measures and security and safety practices for off-campus facilities? - correct answers Security inspections and risk assessments
What are three types of security-sensitive facilities that can be located off campus? - correct answers Centralized information technology/information services, patients records storage, and home healthcare worker services and programs.
What are four of the most important protective measures and security and safety practices for off-campus facilities? - correct answers Ensure security polices and personnel are in place, duress alarms installed and operating and employees know how to use them, and employees report security incidents.
What are three ways off-campus workers can communicate security emergencies? - correct answers Cell phone, overhead paging systems and pagers.
What are part of the security officer's role in providing security services and protective measures at off-Campus locations? - correct answers 1) Conduct the security risk assessments to determine what security protections are required at off-campus facilities. 2) Be alert to, identify, and report specific situations that encourage or make crime more likely at off-campus facilities.
A forensic patient's criminal record should be disclosed to whom? - correct answers Security personnel only
What organization provides training and education on preventing infant abduction? - correct answers National Center for Missing and Exploited Children
Who should talk to the media about VIPs in your facility? - correct answers Public relations or administration personnel
Homeless individuals who take shelter in your facility may commit what crimes? - correct answers Assault, theft and homocide
Individuals with Munchausen syndrome may do what? - correct answers Refuse medical treatment
What should be done about known gang members who require medical treatment in your facility? - correct answers They should be admitted under an assumed name.
Infant abductions can be prevented by doing what? - correct answers Educating staff and parents.
Who should take charge in dealing with combative patients? - correct answers Experienced medical staff members.
Which is the most commonly used identification system in security plans to prevent infant abduction? - correct answers Four-bracelet system.
Stalking can be defined as what? - correct answers Unwanted e-mails, photographing and obsessive phone calls.
Your effectiveness in dealing with behavior problems depends on what? - correct answers Your verbal communications skills.
There are how many routes of infections transmission? - correct answers Three: airborne, contact and droplet.
Who requires that security officers be able to demonstrate age-specific competence when interacting with children and the elderly? - correct answers The Joint Commision
The National Center for Missing and Exploited Children has published which of the following? - correct answers A booklet to assist in developing an abduction prevention and response plan.
How can security and medical staff ease tension in an emergency department waiting room? - correct answers Form a system of constant communication.
Which of the following is not an outward sign of gang activity? - correct answers A group comprised of the same ethnic origin.
A healthcare security or police officer should do what during a labor dispute? - correct answers Remain objective.
A healthcare security department should do this with any photographic or video evidence from a civil disturbance. - correct answers Turn it over to the organization's legal department.
Which of the following is a challenge encountered by healthcare security when dealing with a VIP? - correct answers Increased access control, patient privacy and the news media.
What is the term used to describe individuals who pose as licensed healthcare providers? - correct answers Medical imposters.
The Joint Commission is a __________________ accrediting authority recognized by government agencies, insurance companies, and healthcare providers. - correct answers Voluntary
The mechanism used to evaluate external potential adverse impacts on the hospital is called the _________________________ . - correct answers Proactive risk assessment.
With regard to security in women's services areas, the standards of The Joint Commission and guidelines of the National Center for Missing and Exploited Children are what? - correct answers Mutually supportive.
After the healthcare organization has identified the list of potential threats, prioritized the list, and selected those that would affect the facility, it must do what? - correct answers Implement procedures and controls to reduce or eliminate areas of vulnerability.
Beginning in January 2008, under The Joint Commission's Emergency Management Standards the increased responsibilities of security include what? - correct answers Identifying the role of law enforcement and the National Guard at the facility during emergencies.
Effective security requires balancing three elements: people, procedures and what? - correct answers Equipment
Which of these is a system that provides continuous power to an alternating current line within a prescribed tolerance and protects against over-voltage conditions, loss of primary power, and intermittent brownouts? - correct answers Uninterrupted Power Supply (UPS)
Which document contains requirements that must be complied with when electronic access control devices are used? - correct answers NFPA 101
What is the term for locking devices that prevents a door from being opened fro the egress slide for a period of time (usually 15 or 30 seconds)? - correct answers Delayed egress lock
What is the most common type of credential reader used today? - correct answers Card reader. [Show Less]