Pre-Summer Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ASIS-PSP Questions and Answers

Question # 6

Microwave sensors should be mounted

A.

aimed at an exterior wall.

B.

at the height of an intruder in the area being protected.

C.

near the floor of the area being protected.

D.

near the ceiling of the area being protected.

Full Access
Question # 7

The planning phase of a physical protection system implementation produces which two of the following very important work products?

A.

Design requirements and sole-source justification

B.

Cost and equipment list

C.

Contract information and bidder instructions

D.

Drawings and preliminary design

Full Access
Question # 8

A civil action based on the principle that one individual can expect certain behavior from another individual is known as:

A.

Transitivity

B.

Tort

C.

Reassembly

D.

Procurement

Full Access
Question # 9

Material Safety Data Sheet (MSDS) that must be available for each chemical at the work site contains which sections?

A.

Production identification

B.

Hazardous ingredients list

C.

Physical characteristics

D.

All of the above

Full Access
Question # 10

Microwave sensors work best on targets moving through the detection zone:

A.

Laterally in relation to the sensor

B.

At high speed

C.

Toward or away from the sensor

D.

At low speed

Full Access
Question # 11

The measures of effectiveness of entry control include throughput, false acceptance rate, and:

A.

Cost

B.

Activation delays

C.

False rejection rate

D.

System obsolescence

Full Access
Question # 12

What are restricted as to entrance or movement by all but authorized personnel and vehicles?

A.

Terminal operations

B.

Surveillance

C.

Total programs

D.

Controlled areas

Full Access
Question # 13

Which of the following costs are considered in the cost of loss formula [K = (Cp + Ct + Cr + Ci) - I] used to value assets?

A.

Permanent replacement, lost income, and temporary protection

B.

Temporary security staff, permanent protection, and permanent replacement

C.

Repair or replacement, temporary security staff, and insurance

D.

Permanent replacement, a temporary substitute, and lost income

Full Access
Question # 14

What is the distance limitation for category-rated unshielded twisted pair (UTP) cable?

A.

100 ft. (31 m)

B.

238 ft. (73 m)

C.

328 ft. (100 m)

D.

492 ft. (150 m)

Full Access
Question # 15

Under 50/50 rule of comparative negligence, the plaintiff can collect for damages if he or she was responsible for more or less than 50 percentage of the negligence.

A.

True

B.

False

Full Access
Question # 16

A basic and time-honored access control tool is the

A.

employee identification card.

B.

personal recognition.

C.

visitor pass.

D.

proximity card.

Full Access
Question # 17

What refers to the number of employees over which any individual can exercise direct supervision effectively?

A.

Corporate period

B.

Delegate control

C.

Span of control

D.

None of the above

Full Access
Question # 18

Which class of fire, fires and extinguishes deal with cooking oil fires?

A.

Class C

B.

Class D

C.

Class K

D.

Class L

Full Access
Question # 19

The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:

A.

Business continuity

B.

Business recovery

C.

Business resumption

D.

Business healing

Full Access
Question # 20

How can the value of an asset to an organization be characterized?

A.

Cumulative value

B.

Replacement value

C.

Value found through surveys

D.

Value found in industry publications

Full Access
Question # 21

The FIRST step in the Enterprise Security Risk Management (ESRM) process is to:

A.

Identify asset values

B.

Understand the context

C.

Conduct a risk assessment

D.

Identify risk mitigation measures

Full Access
Question # 22

The sites that are partially configured but are missing the central computer are called:

A.

Hot sites

B.

Warm sites

C.

Cold sites

D.

Frequent sites

Full Access
Question # 23

All physical barriers are designed to discourage three types of penetration. These types of penetration are:

A.

Accident, force, and stealth

B.

Force, stealth, and tools

C.

Vehicle, stealth, and force

D.

Stealth, deception, and force

Full Access
Question # 24

With regard to the overall life of a lamp, the best lighting option for the parking area of a retail shopping center would be:

A.

Metal halide

B.

Low-pressure sodium

C.

Halogen

D.

High-pressure sodium

Full Access
Question # 25

When selecting countermeasures for risk mitigation, the security practitioner should consider:

A.

As a threat increases in sophistication, the effectiveness of the countermeasures should remain unchanged

B.

The same levels of countermeasure effectiveness and system performance are needed to address different threats

C.

The effectiveness of individual countermeasures and the entire security system depends on the security department ' s capabilities

D.

As a threat increases in sophistication, the effectiveness of the countermeasures must also increase, or the additional risk must be managed by some other means

Full Access
Question # 26

To identify and classify risk, it is necessary to examine all activities and relationships of a facility and develop answers to which of the following three basic considerations?

A.

Assets, exposure, and losses

B.

Losses, assets, and countermeasures

C.

Countermeasures, exposure, and assets

D.

Resources, assets, and countermeasures

Full Access
Question # 27

Critical process recovery requires an assessment of resources.

A.

True

B.

False

Full Access
Question # 28

One example of a company’s intangible assets would be its:

A.

Patents

B.

Reputation

C.

Digital files

D.

Obsolete equipment

Full Access
Question # 29

What incorporate a detection system, which can eliminate concerns over water damage and false activation of the system?

A.

Discovery system

B.

Exposure

C.

Post-action system

D.

Pre-action system

Full Access
Question # 30

A change key is normally used to

A.

minimize distribution of keys.

B.

open a single lock within a keyed system.

C.

open several locks within a keyed system.

D.

insert a new core into a lock.

Full Access
Question # 31

The contingency fee component of a bid package represents what percentage of the total cost figure?

A.

5%

B.

10%

C.

15%

D.

20%

Full Access
Question # 32

Lux is defined as a/an:

A.

Measurement of illumination

B.

Measure of light on a surface

C.

Luminare

D.

Electric arc along the length of a tube

Full Access
Question # 33

Which of the following BEST mitigates the risk of power loss in a computer?

A.

Surge protector

B.

Uninterrupted power supply

C.

Emergency generator

D.

Batteries

Full Access
Question # 34

_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.

A.

Physical security

B.

Network Security Policy

C.

Forensic investigations

D.

Spam filtering

Full Access
Question # 35

Which of the following is an " active volumetric sensor " ?

A.

Infrared

B.

Capacitance

C.

Ultrasonic

D.

Vibration

Full Access
Question # 36

What generally means removing the risk to the company by paying for the protection of an insurance policy?

A.

Security

B.

Risk transfer

C.

Collateral

D.

Self-assurance

Full Access
Question # 37

One way to defeat an exchange badge credential system is to:

A.

Add an image to the access control server

B.

Guess the PIN

C.

Create a power failure

D.

Alter one ' s face to match the image on a stolen badge

Full Access
Question # 38

Who generally provide an advisory or service function to a line executive?

A.

Chief financial officer

B.

Merchandiser

C.

Staff personnel

D.

Retail marketer

Full Access
Question # 39

What involves walking or riding a given route to observe the condition of the facility?

A.

Patrol duty

B.

Posts

C.

Reserves

D.

None of the above

Full Access
Question # 40

How does the tangibility of an asset impact a risk assessment?

A.

Tangible assets are valued higher than intangible assets because they have a physical presence.

B.

Tangible and intangible assets require the same mitigation strategies because they both have value.

C.

Intangible assets are valued higher than tangible assets because of the potential impact to reputation.

D.

Intangible and tangible assets should be evaluated according to their individual values and protected accordingly.

Full Access
Question # 41

What results from fearing the consequences of being caught; and is a product of reasoning?

A.

Speech honesty

B.

Conditional honesty

C.

Integrity

D.

Conduct

Full Access
Question # 42

In the procurement process, the pre-bid conference provides the contractor:

A.

An opportunity for contractors to submit proposals for the project anonymously

B.

An opportunity to ask for any clarifications about information contained in the bid documents

C.

An opportunity to ask other contractors to estimate the total cost of their proposal for comparison

D.

An opportunity for the owner or owner ' s representative to disclose the expected cost of the project

Full Access
Question # 43

A study of BDP international has found that ___________ of shippers are factoring in additional time to comply with the Advanced Manifest System, which went into effect in February 2003. This Department of Homeland security rule requires the filing of complete import manifest documentation at least 24 hours before U.S.-bound ships are loaded at foreign ports.

A.

30 percent

B.

25 perc

C.

35 percent

D.

40 percent

Full Access
Question # 44

When developing a maintenance plan and the associated service levels, a system owner should place the greatest emphasis for support on equipment that:

A.

Has been in service for the longest time

B.

Would have the greatest impact on the overall system should it fail

C.

Would take the longest time to fix should it fail

D.

Requires preventative maintenance to function properly

Full Access
Question # 45

IP sends information across networks in packets, each containing between 1 and approximately:

A.

1,000 characters

B.

12, 00 characters

C.

15, 00 characters

D.

18, 00 characters

Full Access
Question # 46

The concept of __________ arises from agency law in which one party has the power to control the actions of another party involved in the contract or relationship.

A.

Compliance liability

B.

Vicarious liability

C.

Active liability

D.

Passive liability

Full Access
Question # 47

The systems that utilized in communities that have a municipal alarm system are called:

A.

Warning system

B.

Auxiliary system

C.

Main system

D.

Alert system

Full Access
Question # 48

Which sensor is commonly used on doors and/or windows?

A.

Capacitance

B.

Electromechanical

C.

Infrasonic

D.

Fiber optic

Full Access
Question # 49

A corporation is in need of security personnel to guard visitor parking lots, highly sensitive projects, and top-secret projects. What is the MOST viable and cost-effective security staffing strategy for the corporation?

A.

Hybrid

B.

Contract

C.

Proprietary

D.

Total systems

Full Access
Question # 50

A threat assessment and a vulnerability analysis are parts of the:

A.

Operating security review

B.

Project feasibility study

C.

Preliminary design

D.

Security systems architecture

Full Access
Question # 51

Which of the following is the type of comparative negligence statute?

A.

Pure approach

B.

50/50 rule

C.

51 percent rule

D.

All of the above

Full Access
Question # 52

The demographics of an ongoing police and security force at the ___________________ create opportunities for advancement.

A.

Company Level

B.

Personal level

C.

Management level

D.

Advance level

Full Access
Question # 53

A good risk management program involves:

A.

Identify risks or specific vulnerabilities

B.

Analyze and study risks, including likelihood and degree of danger of an event

C.

Study of security programs

D.

All of the above

Full Access
Question # 54

A complete contingency planning program has which of the following major elements?

A.

Emergency response

B.

Crisis management

C.

Business continuity

D.

All of the above

Full Access
Question # 55

When exterior lighting is employed, an initial survey is conducted at lighting installation, and then

A.

weekly.

B.

monthly.

C.

semi-annually.

D.

annually.

Full Access
Question # 56

The basic function of an electronic security system ESS during an attempted or successful penetration is to

A.

activate alarms.

B.

notify personnel.

C.

activate countermeasures.

D.

activate other physical security systems.

Full Access
Question # 57

Which of the following is best for reducing the number of nuisance alarms?

A.

Placing signage on the inside of doors

B.

Conducting frequent door inspections and promptly replacing faulty components

C.

Having security guards patrol after hours

D.

Examining janitorial programs and ensuring that cleaning is done only during the day

Full Access
Question # 58

Successful security design recognizes technological developments and integrates:

A.

Adversary sequence diagrams, system specifications, and work breakdown structure

B.

Threats, operational factors, and likelihood of occurrence

C.

Operational factors, organizational needs, and the human element

D.

Architectural aspects, security systems, and operational factors

Full Access
Question # 59

What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?

A.

Strict liability

B.

Plaintiff

C.

Defendant

D.

None of the above

Full Access
Question # 60

The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?

A.

International terrorism

B.

Modern terrorism

C.

Modern Revolutionary

D.

Modern War weapons

Full Access
Question # 61

Testing designed to determine whether a system is functional, has adequate sensitivity, and meets design and performance objectives accurately describes which of the following?

A.

Factory acceptance testing

B.

Reliability performance testing

C.

Equipment performance testing

D.

Site acceptance testing

Full Access
Question # 62

When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:

A.

Innocuous Bug

B.

Catastrophic Virus

C.

Hostile worm

D.

Trojan Horse

Full Access
Question # 63

______________ has been defined as the impact of a loss as measured in dollars.

A.

Criticality

B.

Loss reserves

C.

Corruptness

D.

Immorality

Full Access
Question # 64

To use _____________ for the storage of valuables subject to theft, an all too common practice is to invite disaster.

A.

Fire-resistance safes

B.

Control safes

C.

Record safes

D.

Resistive safes

Full Access
Question # 65

Which of the following is an example of an intangible asset?

A.

Land

B.

Buildings

C.

Natural resources

D.

Intellectual property

Full Access
Question # 66

A security supervisor is evaluating access to control devices for the data center. The option that provides the highest level of security is

A.

a proximity card.

B.

a computer-controlled keypad.

C.

a smart card.

D.

retinal pattern recognition.

Full Access
Question # 67

A Physical Security Professional ' s analysis of data collected during a risk analysis helps

A.

make informed decisions regarding identified risks.

B.

identify peak activities that require additional countermeasures.

C.

apply the most effective technology for observed traffic patterns.

D.

communicate the costs and benefits of risk to senior management.

Full Access
Question # 68

Observability is the ability of the adversary to

A.

report a vulnerability.

B.

cause a vulnerability.

C.

exploit a vulnerability.

D.

recognize a vulnerability.

Full Access
Question # 69

Theft triangle consists of:

A.

dander, desire, opportunity

B.

motive, condition, opportunity

C.

motive, desire, opportunity

D.

dishonesty, financial problem, prospect

Full Access
Question # 70

As the project overseer in a major construction project, who is responsible for providing documentation for the final security system design?

A.

Security Vendor

B.

System Engineer

C.

Architect

D.

Security Consultant

Full Access
Question # 71

What are the three common categories of risk?

A.

Personnel, property, and hazards

B.

Property, financial, and liability

C.

Personnel, property, and liability

D.

Hazards, personnel, and liability

Full Access
Question # 72

Decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss is called:

A.

Risk diffusion

B.

Risk production

C.

Risk spreading

D.

Risk protection

Full Access
Question # 73

Which of the following are the four types of lock-down systems?

A.

locks, plates, cables and alarms

B.

cages, plates, bolts and alarms

C.

cages, plates, cables and alarms

D.

cages, padlock, cables and alarms

Full Access
Question # 74

In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.

A.

True

B.

False

Full Access
Question # 75

In the context of risk, which of the following is considered a hazard?

A.

The possible occurrence of an event

B.

The probable occurrence of an event

C.

The difference between actual and expected losses

D.

A contributing factor to a peril

Full Access
Question # 76

What are used only for handling and storing high-value cargo?

A.

Limited areas

B.

Exclusion areas

C.

Multiple areas

D.

None of the above

Full Access
Question # 77

To deal with the lack of security, both government organizations have developed guidelines for protecting electric facilities and distribution systems. On the private side, the Edison Electric Institute developed guidelines that have been passed on to the North American Electric Reliability Council (NERC), the U.S. Department of Energy’s coordinator for the U.S. electrical infrastructure. Among other things the guide lines cover:

A.

Vulnerability/risk analysis

B.

Threat response

C.

Cyber scenario

D.

Emergency detection

Full Access
Question # 78

What type of security officer order addresses a single subject in easy to understand terms, is made available at each guard station, and can be used to provide a basis for site-specific training?

A.

Post

B.

Special

C.

General

D.

Standing

Full Access
Question # 79

Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?

A.

Transmission Control protocol

B.

File Transfer protocol

C.

Information Control protocol

D.

None of the above

Full Access
Question # 80

Threats are generally classified as:

A.

High risk or low risk

B.

Overt or covert

C.

Internal or external

D.

Man-made or natural

Full Access
Question # 81

Who developed Ethernet?

A.

Xeror Corporation

B.

IBM

C.

Microsoft

D.

None of the above

Full Access
Question # 82

Which of the following is NOT the activity and concern of a crisis management plan?

A.

Crisis management team

B.

Disaster operation

C.

Media operation

D.

Vital records

Full Access
Question # 83

A threat source differentiates the potential of one facility to be attacked versus another in a different location. This activity is referred to as:

A.

Targeting

B.

Motivation

C.

Collusion

D.

Desire

Full Access
Question # 84

Ideally a business should have four sets of backup files;

A.

with one set of files staying on-site and three sets of files being stored off-site

B.

with two of files staying on-site and two sets of files being stored off-site

C.

with three set of files staying on-site and one set of files being stored off-site

D.

with four set of files staying on-site and no set of files being stored off-site

Full Access
Question # 85

Successful implementation of any physical security construction project hinges largely on a well-defined and executed:

A.

Request for quotation

B.

Business impact analysis

C.

Procurement contract

D.

Cost analysis

Full Access
Question # 86

What signal the entry of persons into a facility or an area while the system is in operation?

A.

Invasions

B.

Access door

C.

Intrusion alarms

D.

Protection alarms

Full Access
Question # 87

What is the definition of assets?

A.

Anything that brings fame to an enterprise.

B.

Anything that brings money to an enterprise.

C.

Anything that does not have value to an enterprise.

D.

Anything that has tangible or intangible value to an enterprise.

Full Access
Question # 88

When a bomb threat is received and identifies a specific floor as containing the bomb, the initial building evacuation should focus on the affected floor and:

A.

The immediate area

B.

The floors immediately above and below

C.

All floors above

D.

All floors below

Full Access
Question # 89

At the conclusion of a project, which of the following types of drawings should be provided as part of the project execution?

A.

Archival

B.

Post-construction

C.

Floorplan

D.

As-built

Full Access
Question # 90

Which of the following are the three types of cost estimates used in the implementation of a physical protection system?

A.

Preliminary design, final design, and maintenance

B.

Budgetary, preliminary design, and final design

C.

Budgetary, preliminary design, and contingency

D.

Preliminary design, final design, and contingency

Full Access
Question # 91

Communism has common property and radical Islam has sharing property

A.

True

B.

False

Full Access
Question # 92

The process of planning for response, recovery, and resumption activities for the infrastructure, critical processes and other elements is known as:

A.

Contingent planning

B.

Continuity planning

C.

Resource planning

D.

Resumption planning

Full Access
Question # 93

Insurance can be a substitute for a security program.

A.

True

B.

False

Full Access
Question # 94

What not only reflect an applicant’s financial situation and stability, they also provide other useful solution such as past addresses and previous employers?

A.

Legal reports

B.

Credit reports

C.

Status reports

D.

Miscellaneous reports

Full Access
Question # 95

In recommending deadbolt locks, the minimum throw of the deadbolt to provide adequate protection against jamb spreading is

A.

1/2 inch 1.3 centimeters

B.

5/8 inch 1.6 centimeters

C.

3/4 inch 1.9 centimeters

D.

1 inch 2.5 centimeters

Full Access
Question # 96

From a management point of view, organizing the security effort involves:

A.

Planning & goal setting

B.

Establishing controls

C.

Hiring personnel

D.

All of the above

Full Access
Question # 97

System integration is the process of combining individual technology elements, procedures, and which of the following into one system for providing security at a facility?

A.

Safety

B.

Equipment

C.

Personnel

D.

Management

Full Access
Question # 98

To execute a project successfully, the project manager MUST balance which three competing factors?

A.

Scope, time, and cost

B.

Quality, quantity, and constraints

C.

Objectives, risks, and outcomes

D.

Design, procurement, and installation

Full Access
Question # 99

When designing a security program, establishing performance requirements increases the effectiveness of the program by

A.

validating that regulations and requirements have been satisfied as part of the security design.

B.

selecting security features that contribute and enhance performance to the overall strategy.

C.

ensuring that the security features used are properly certified for the purpose they are selected for.

D.

helping to create a checklist type validation that all components have the specific features required.

Full Access
Question # 100

In which ingredients are added to the loss prevention function one by one as the need arises, without a comprehensive plan, is called:

A.

Piecemeal security

B.

Small relative security

C.

Detached security

D.

Independent security

Full Access
Question # 101

Criteria for intrusion sensor performance is typically measured by which of the following?

A.

Alarm rate probability, nuisance alarm rate, and vulnerability to defeat

B.

Probability to detect, nuisance alarm rate, and vulnerability assessment

C.

Alarm rate probability, annunciation rate, and vulnerability to defeat

D.

Probability to detect, nuisance alarm rate, and vulnerability to defeat

Full Access
Question # 102

What bulk explosive detection technology operates by spinning around a package and viewing the contents from different angles, making it the only available technology which calculates a material ' s mass, density, and mass absorption coefficient?

A.

High Energy X-Ray

B.

Computed Tomography CT

C.

Quadrupole Resonance QR

D.

Low Dose Backscatter X-Ray

Full Access
Question # 103

Which of the following is NOT the distinct action that fall into invasion of privacy?

A.

misappropriation of the plaintiff’s name or picture for commercial advantage

B.

placing the plaintiff in the false light

C.

private disclosure of public facts

D.

intrusion into the seclusion of another

Full Access
Question # 104

The purpose of methodical examination is to:

A.

Find deviations from established security standards and practices

B.

Find loopholes in security controls

C.

consider means of improving the efficiency or control of the operation without reducing security

D.

All of the above

Full Access
Question # 105

Which of the following conditions affects the sensitivity of a capacitance proximity sensor?

A.

Changes in relative humidity

B.

Changes in relative temperature

C.

Rapid movement of air through the electromagnetic field

D.

End of line resistance

Full Access
Question # 106

According to best practices, who should offer a warranty that includes full maintenance of the equipment?

A.

The vendor

B.

The manufacturer

C.

Security Manager

D.

Installing technician

Full Access
Question # 107

Coverage of what provides remuneration for losses due to employee dishonesty?

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Insurance against loss of use

Full Access
Question # 108

The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:

A.

Analysis

B.

Integrity

C.

Security

D.

Availability

Full Access
Question # 109

Pandemics affect people, not infrastructure.

A.

True

B.

False

Full Access
Question # 110

To protect against interruption of critical telecommunications systems, security professionals should recommend:

A.

Cable access points be under either direct observation or within CCTV camera view at all times

B.

Wireless communication in lieu of cable

C.

Tamper-proof fiber optic cables should be used

D.

Two physically separated paths for telecommunications cable entering the facility

Full Access
Question # 111

When developing a request for proposal (RFP), a specification that requires bidders to satisfy overall system effectiveness measure is referred to as:

A.

Performance-based

B.

Feature-based

C.

Results-based

D.

Cost-based

Full Access
Question # 112

Who must regularly study and analyze the channels of communication to be certain that the input they receive is accurate, relevant, timely, concise and informative?

A.

Chief Information Officer

B.

Information Security Information Officer

C.

Chief Minister

D.

Chief Security Officer

Full Access