ASIS ASIS-PSP Physical Security Professional (PSP) Exam Exam Practice Test
Physical Security Professional (PSP) Exam Questions and Answers
What are the two methods that are readily utilized in magnetometers to detect metal?
Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.
Removing the problem by eliminating the risk is known as:
A primary ingredient that represents the loss prevention specialist’s opportunity to reduce theft is called:
Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.
To ensure consistent bid submissions, a walk-through of affected buildings and locations should be conducted at the:
Coverage of what provides remuneration for losses due to employee dishonesty?
Which department has total supervision over a firm’s money and will generally be the area most vulnerable to major loss due to crime?
A guiding principle of business continuity planning is that the plan:
To deal with the lack of security, both government organizations have developed guidelines for protecting electric facilities and distribution systems. On the private side, the Edison Electric Institute developed guidelines that have been passed on to the North American Electric Reliability Council (NERC), the U.S. Department of Energy’s coordinator for the U.S. electrical infrastructure. Among other things the guide lines cover:
Insurance can be a substitute for a security program.
Nuisance alarm rate is calculated by knowing which of the following?
Which of the following is an example of a tangible asset?
Concerns itself with those means by which a given facility protects itself against theft and any natural disasters is called:
For typical CCTV surveillance, which of the following common surfaces has the lowest reflectance?
Which of the following verifications is included in a security system acceptance test?
What is a major management function in business worldwide?
The contingency fee component of a bid package represents what percentage of the total cost figure?
Which one of the following options should be included in post orders?
Which of eth following is NOT the type of insurance?
Which liability is of concern to enterprises that contract or employs security services and is an indirect legal responsibility?
The concept that accepts the fact that the plaintiff may have contributed to his or her own injury, such as being in a restricted area or creating a disturbance or some hazard is known as:
Which of the following interior sensors can be defined as both passive and active?
An event that is possible but uncertain in terms of occurrence or that is likely to happen as an adjunct to other events is called:
Communism has common property and radical Islam has sharing property
A company has selected a project manager to upgrade security at its manufacturing plants. A risk assessment for each plant has been completed. Which of the following is the first action of the project manager?
During an attack, the critical detection point occurs when the remaining attack path exceeds:
Which of the following lamp types emits an almost monochromatic yellow light and provides the poorest color rendition for a CCTV camera?
Which of the following BEST mitigates the risk of power loss in a computer?
What is the result of a jurisdiction either using common law, which was adopted from English traditions, or passing specific legislation called statutory law?
An owner ' s acceptance of a security system marks the beginning of:
Which of the following is NOT the organizational level of international terrorism?
What generally means removing the risk to the company by paying for the protection of an insurance policy?
A new research and development center is being planned. At what point in the project should the security manager become involved?
The purpose of methodical examination is to:
To protect a company and its assets, the FIRST step is to perform a/an
_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.
For typical video surveillance, which of the following common surfaces has the lowest reflectance?
In a low-light application, which of the following lens characteristics would allow the MOST light to enter the camera?
Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.
_______________ of risk involves planning for an eventual loss without benefit of insurance.
Which of the following is the most widely accepted classification of skills for the leadership?
Asset value is determined by which of the following elements?
Security system maintenance specifications should state that all hardware and software updates and upgrades be:
In risk assessment and management, predictability for security purposes is mainly an indicator of
Which approach is dealt with terrorists’ personalities, their recruitment, and their induction into terrorist organizations, beliefs, attitudes, motivations and careers?
All physical barriers are designed to discourage three types of penetration. These types of penetration are:
While conducting a security survey, the surveyor would need to reference which of the following drawings in order to determine the location of all security devices?
The type of electric locking device that permits free mechanical egress from the protected side of the door is the:
A change key is normally used to
Which of the following types of alarm transmission systems is designed to reduce leased telephone line charges while providing a higher degree of security?
The technology used in a retail security system that uses VHF/microwave is an electronic:
What not only reflect an applicant’s financial situation and stability, they also provide other useful solution such as past addresses and previous employers?
Private security functions are not essentially client orientated; public law enforcement functions are society or community oriented.
Major outputs of the security system planning phase include definition of stakeholders, which of the following?
Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:
A cost-effective system integration design MUST balance:
The demographics of an ongoing police and security force at the ___________________ create opportunities for advancement.
What are restricted as to entrance or movement by all but authorized personnel and vehicles?
A project specification includes, but is not limited to, system requirements that identify:
When reviewing an Intrusion Detection System (IDS), what type of analysis includes numeric values for probability of detection (PD), the system ' s false alarm rate (FAR), and its nuisance alarm rate (NAR)?
The introduction of holography into badge control systems reduces the chance of:
Trimming off small amounts of money from many sources and diverting these slices into one’s own or an accomplice’s account is known as:
Observability is the ability of the adversary to
What have been secured to some extent by limiting access to underground areas?
In which approach of comparative negligence, the plaintiff may collect something for injuries even if he or she was primarily responsible for the injuries?
The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:
What allows people to log on to a remote computer and use the resources of that system if they have a valid account?
Which of the following is the type of sensor used to protect metal containers by sensing entry into the magnetic field that it creates around them?
Equipment requirements, installation services, and ongoing maintenance services are all part of:
What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?
Which of the following techniques would be used to make an unauthorized key for a lock?
The primary functions of a physical protection system are:
Several fur coats were stolen from the first floor of a retail store. The security manager and store manager decide to relocate the coat department to the second floor and install a video surveillance system and anti-theft tags. New rules are also put in effect limiting the number of coats that can be taken off the racks at any one time. These actions can be defined as
The planning phase of a physical protection system implementation produces which two of the following very important work products?
Which of the following error-rate combinations with a biometric entry control device provides the highest level of security?
What are wide-beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier?
The relationship between the two groups continues to be strained because of which key issue?
Premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents, usually intended to influence an audience is called:
A set of unwanted instructions executed on a computer and resulting in a variety of effects is called:
The system which provides an extra measure of security by requiring that exchanges take place at the entrance to each restricted area within the controlled area is called:
If emergency exit stairwells in a high-rise building are used by tenants for convenient travel between floors, and it is permitted by local jurisdiction, the stairwell doors should be:
Predictability for security purposes is mainly an indicator of:
The sites that are partially configured but are missing the central computer are called:
Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?
What can be used as servers and do not require special installation?
WANs used which protocol developed by the Consultative Committee for International Telephone and Telegraph.
Which one of the following options should be considered with respect to the issuance of weapons?
The MOST obvious security problem resulting from using a master-keying system is that
__________ is a plant, building, office, institution, or any commercial or industrial structure or complex with all the attendant structures and functions that are part of an integrated operation.
When designing a security program, establishing performance requirements increases the effectiveness of the program by
Which of the following is a key factor to be considered when evaluating whether a particular facility is at risk for a bombing?
A threat source differentiates the potential of one facility to be attacked versus another in a different location. This activity is referred to as:
What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?
Security services in which the security force is hired and controlled directly by the protected organization are called:
A voluntary and intentional violation by a legally competent parson of a legal duty that commands or prohibits an act for the protection of society is known as:
To identify and classify risk, it is necessary to examine all activities and relationships of a facility and develop answers to which of the following three basic considerations?
Which of the following are the three types of cost estimates used in the implementation of a physical protection system?
What must be accomplished to accurately determine the financial and operational impact that could result from an interruption of enterprise operations?
Some people emerge as experts who then sell their expertise for a fee; these people are commonly referred to as:
Strategies for risk treatment are determined by the
In the procurement process, the pre-bid conference provides the contractor:
When evaluating risk, what factor describes the state of being susceptible to harm or injury?
Theft triangle consists of:
Video surveillance camera selection should be based primarily on the:
Which of the following statements does not describe characteristics applicable to perimeter lighting?
_______ requires that the arrestee be turned over to the authorities as soon as practicable and in any event without unreasonable delay.
Businesses have been forced to come to terms with potential consequences of taking security risks and the solution which should be complementary is:
A good risk management program involves:
The common practices in recruiting a jihadist are:
The annual loss expectancy (ALE) formula is based on:
Which terrorism requires organization and some type of leadership, recruitment, training, and retention of members?