Prepare for the OSH Security Test effectively with our comprehensive quiz. Dive into multiple-choice questions that enhance your understanding of workplace security protocols and requirements. Access hints and explanations to boost your readiness for the exam!

Each practice test/flash card set has 50 randomly selected questions from a bank of over 500. You'll get a new set of questions each time!

Practice this question and more.


A worker returns to the worksite after hours and advises he has forgotten his tools in a secure area of the facility that he says he needs the next morning for work at another worksite. What should you do?

  1. Let the worker get his tools and submit a report

  2. Properly identify the worker, escort him to the area and note all property he removes in detail

  3. Refuse him access to the area and advise him to return during business hours the next day

  4. Call the property manager at home to get authorization before giving the worker his tools

The correct answer is: Properly identify the worker, escort him to the area and note all property he removes in detail

The correct choice involves properly identifying the worker, escorting him to the area where the tools are stored, and meticulously noting all property he removes. This approach ensures that security protocols are maintained, safeguarding both the facility and its assets. By verifying the identity of the worker, you confirm that he is indeed authorized to access the area and retrieve his tools. The escort aspect further guarantees that the tools are retrieved under supervision, which helps prevent any potential theft or misplacement of items. Additionally, documenting the exact items removed is crucial for inventory control and maintaining accountability. This level of diligence protects the organization from liability if any issues arise related to the retrieved items. While the other options present different considerations, such as allowing access without supervision or refusing access altogether, they may not adequately address security and accountability measures that are essential in this scenario.