Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

ASIS ASIS-PSP Physical Security Professional (PSP) Exam Exam Practice Test

Page: 1 / 38
Total 375 questions

Physical Security Professional (PSP) Exam Questions and Answers

Question 1

What are the two methods that are readily utilized in magnetometers to detect metal?

Options:

A.

Millimeter wave and bi-static wave

B.

Continuous-wave and pulsed-field

C.

Bi-static wave and ultra-static wave

D.

Continuous-wave and bi-static wave

Question 2

Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.

Options:

A.

business continuity, business recovery

B.

business recovery, business resumption

C.

business recovery, business continuity

D.

business continuity, business resources

Question 3

Removing the problem by eliminating the risk is known as:

Options:

A.

Risk avoidance

B.

Risk prevention

C.

Risk reduction

D.

Risk elimination

Question 4

A primary ingredient that represents the loss prevention specialist’s opportunity to reduce theft is called:

Options:

A.

Low deterrence

B.

Confusion

C.

Common denominator

D.

Reduced Pilfering

Question 5

Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.

Options:

A.

Asset standard Act

B.

Material Safety Data Sheet

C.

Procurement Asset Safety Program

D.

Product stability program

Question 6

To ensure consistent bid submissions, a walk-through of affected buildings and locations should be conducted at the:

Options:

A.

Engineering evaluation

B.

Pre-bid conference

C.

Invitation for bid

D.

Procurement meeting

Question 7

Coverage of what provides remuneration for losses due to employee dishonesty?

Options:

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Insurance against loss of use

Question 8

Which department has total supervision over a firm’s money and will generally be the area most vulnerable to major loss due to crime?

Options:

A.

Accounting

B.

Data-Processing

C.

Purchasing

D.

Shipping and Receiving

Question 9

A guiding principle of business continuity planning is that the plan:

Options:

A.

Must include remote site capability

B.

Must be flexible and adapted to meet the situation

C.

Must include full instructions from management on all contingencies

D.

Should be in outline format and established as the recovery mission unfolds

Question 10

To deal with the lack of security, both government organizations have developed guidelines for protecting electric facilities and distribution systems. On the private side, the Edison Electric Institute developed guidelines that have been passed on to the North American Electric Reliability Council (NERC), the U.S. Department of Energy’s coordinator for the U.S. electrical infrastructure. Among other things the guide lines cover:

Options:

A.

Vulnerability/risk analysis

B.

Threat response

C.

Cyber scenario

D.

Emergency detection

Question 11

Insurance can be a substitute for a security program.

Options:

A.

True

B.

False

Question 12

Nuisance alarm rate is calculated by knowing which of the following?

Options:

A.

Reviewing the sensor applications of the nuisance alarm

B.

The response times for each nuisance alarm divided by a given time period

C.

The ratio of nuisance alarms to real alarms

D.

The number of nuisance alarms received over a given time period

Question 13

Which of the following is an example of a tangible asset?

Options:

A.

Humans

B.

Information

C.

Reputation

D.

Trademarks

Question 14

Concerns itself with those means by which a given facility protects itself against theft and any natural disasters is called:

Options:

A.

refuge

B.

Physical security

C.

safety measures

D.

precautions

Question 15

For typical CCTV surveillance, which of the following common surfaces has the lowest reflectance?

Options:

A.

A snow-covered field

B.

Dry, sandy soil

C.

Asphalt

D.

A red brick building

Question 16

Which of the following verifications is included in a security system acceptance test?

Options:

A.

Cameras are aimed and focused properly

B.

Owner can operate the systems without assistance

C.

Cameras facing the rising or setting sun utilize wide dynamic range

D.

System operates as expected 24 hours per day for 15 consecutive calendar days

Question 17

What is a major management function in business worldwide?

Options:

A.

Security

B.

Projection

C.

Quality

D.

Mission

Question 18

The contingency fee component of a bid package represents what percentage of the total cost figure?

Options:

A.

5%

B.

10%

C.

15%

D.

20%

Question 19

Which one of the following options should be included in post orders?

Options:

A.

Review shift log with relieving officer

B.

Express the policies of the protected enterprise

C.

Verbal instructions override the written instructions

D.

Express the policies of the local authority having jurisdiction

Question 20

Which of eth following is NOT the type of insurance?

Options:

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Privacy Invasion

Question 21

Which liability is of concern to enterprises that contract or employs security services and is an indirect legal responsibility?

Options:

A.

Strict

B.

Negligence

C.

Vicarious

D.

Loose

Question 22

The concept that accepts the fact that the plaintiff may have contributed to his or her own injury, such as being in a restricted area or creating a disturbance or some hazard is known as:

Options:

A.

Control tactics

B.

Comparative fault

C.

Defensive control

D.

None of the above

Question 23

Which of the following interior sensors can be defined as both passive and active?

Options:

A.

Microwave

B.

Infrared

C.

Vibration

D.

Pressure

Question 24

An event that is possible but uncertain in terms of occurrence or that is likely to happen as an adjunct to other events is called:

Options:

A.

Contingent

B.

Critical processes

C.

Conditional delegation

D.

Emergency response

Question 25

Communism has common property and radical Islam has sharing property

Options:

A.

True

B.

False

Question 26

A company has selected a project manager to upgrade security at its manufacturing plants. A risk assessment for each plant has been completed. Which of the following is the first action of the project manager?

Options:

A.

Solicit a request for information

B.

Develop a concept design to solicit support from senior management

C.

Have construction documents prepared and sent to prospective contractors for bids

D.

Develop a phased implementation plan

Question 27

During an attack, the critical detection point occurs when the remaining attack path exceeds:

Options:

A.

Response time

B.

Probability of detection

C.

Probability of interruption

D.

Remaining delay time

Question 28

Which of the following lamp types emits an almost monochromatic yellow light and provides the poorest color rendition for a CCTV camera?

Options:

A.

Low-pressure sodium

B.

Incandescent

C.

Fluorescent

D.

Metal halide

Question 29

Which of the following BEST mitigates the risk of power loss in a computer?

Options:

A.

Surge protector

B.

Uninterrupted power supply

C.

Emergency generator

D.

Batteries

Question 30

What is the result of a jurisdiction either using common law, which was adopted from English traditions, or passing specific legislation called statutory law?

Options:

A.

Criminal law

B.

Offended suit

C.

Case law

D.

Constitution law

Question 31

An owner ' s acceptance of a security system marks the beginning of:

Options:

A.

The warranty period

B.

Phase II assessment

C.

Phase II testing

D.

Site acceptance testing

Question 32

Which of the following is NOT the organizational level of international terrorism?

Options:

A.

Individual terrorism

B.

Modern terrorism

C.

Group terrorism

D.

State terrorism

Question 33

What generally means removing the risk to the company by paying for the protection of an insurance policy?

Options:

A.

Security

B.

Risk transfer

C.

Collateral

D.

Self-assurance

Question 34

A new research and development center is being planned. At what point in the project should the security manager become involved?

Options:

A.

Equipment specification and bid phase

B.

Completion of the preliminary architectural drawings

C.

Initial design phase

D.

Concept presentation to senior management

Question 35

The purpose of methodical examination is to:

Options:

A.

Find deviations from established security standards and practices

B.

Find loopholes in security controls

C.

consider means of improving the efficiency or control of the operation without reducing security

D.

All of the above

Question 36

To protect a company and its assets, the FIRST step is to perform a/an

Options:

A.

business impact analysis.

B.

operational cost analysis.

C.

threat and vulnerability analysis.

D.

cost–benefit analysis.

Question 37

_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.

Options:

A.

Physical security

B.

Network Security Policy

C.

Forensic investigations

D.

Spam filtering

Question 38

For typical video surveillance, which of the following common surfaces has the lowest reflectance?

Options:

A.

A snow-covered field

B.

Dry, sandy soil

C.

Asphalt

D.

A red brick building

Question 39

In a low-light application, which of the following lens characteristics would allow the MOST light to enter the camera?

Options:

A.

Use of a glass lens

B.

Use of a DC iris

C.

A lower F-stop

D.

A higher F-stop

Question 40

Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.

Options:

A.

True

B.

False

Question 41

_______________ of risk involves planning for an eventual loss without benefit of insurance.

Options:

A.

Planning

B.

Transfer

C.

locking

D.

Self-assumption

Question 42

Which of the following is the most widely accepted classification of skills for the leadership?

Options:

A.

Skill Mix

B.

Conceptual

C.

Human relations

D.

All of the above

Question 43

Asset value is determined by which of the following elements?

Options:

A.

Ease of replacement, some measure of value, and original cost

B.

Original cost, criticality, and ease of replacement

C.

Value, original cost, and criticality

D.

Criticality, ease of replacement, and some measure of value

Question 44

Security system maintenance specifications should state that all hardware and software updates and upgrades be:

Options:

A.

Installed until the end-of-life of the product

B.

Included as part of the service level agreement

C.

Installed at no cost under provisions of the warranty

D.

Included in a software maintenance agreement

Question 45

In risk assessment and management, predictability for security purposes is mainly an indicator of

Options:

A.

behavior.

B.

crisis management deterrence.

C.

event history.

D.

countermeasure effectiveness.

Question 46

Which approach is dealt with terrorists’ personalities, their recruitment, and their induction into terrorist organizations, beliefs, attitudes, motivations and careers?

Options:

A.

Multifactor Approach

B.

Physiological Approach

C.

Violence Approach

D.

Criminal approach

Question 47

All physical barriers are designed to discourage three types of penetration. These types of penetration are:

Options:

A.

Accident, force, and stealth

B.

Force, stealth, and tools

C.

Vehicle, stealth, and force

D.

Stealth, deception, and force

Question 48

While conducting a security survey, the surveyor would need to reference which of the following drawings in order to determine the location of all security devices?

Options:

A.

Elevation drawings

B.

Details drawings

C.

Riser diagrams

D.

Plan drawings

Question 49

The type of electric locking device that permits free mechanical egress from the protected side of the door is the:

Options:

A.

Vertical pin

B.

Electromagnetic

C.

Electric strike

D.

Delayed egress

Question 50

A change key is normally used to

Options:

A.

minimize distribution of keys.

B.

open a single lock within a keyed system.

C.

open several locks within a keyed system.

D.

insert a new core into a lock.

Question 51

Which of the following types of alarm transmission systems is designed to reduce leased telephone line charges while providing a higher degree of security?

Options:

A.

Circuit loop

B.

Multiplex

C.

Cellular

D.

Dial-up

Question 52

The technology used in a retail security system that uses VHF/microwave is an electronic:

Options:

A.

Point-of-sale surveillance

B.

Article surveillance

C.

Dual detector

D.

Magnetometer

Question 53

What not only reflect an applicant’s financial situation and stability, they also provide other useful solution such as past addresses and previous employers?

Options:

A.

Legal reports

B.

Credit reports

C.

Status reports

D.

Miscellaneous reports

Question 54

Private security functions are not essentially client orientated; public law enforcement functions are society or community oriented.

Options:

A.

True

B.

False

Question 55

Major outputs of the security system planning phase include definition of stakeholders, which of the following?

Options:

A.

Requirements documents, meeting schedules, and cost estimates

B.

Asset lists, organization charts, and facility-specific threats

C.

Vulnerability studies, adversary sequence diagrams, and defenseindepth

D.

Protective force efficiency, assessment or surveillance, and facility-specific threats

Question 56

Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:

Options:

A.

Unrecognized holds

B.

Hold-on liabilities

C.

Hold harmless clauses

D.

None of the above

Question 57

A cost-effective system integration design MUST balance:

Options:

A.

Insurance and operational costs

B.

Fire safety and security objectives

C.

Human resources and hardware utilization

D.

Risk and control assessments

Question 58

The demographics of an ongoing police and security force at the ___________________ create opportunities for advancement.

Options:

A.

Company Level

B.

Personal level

C.

Management level

D.

Advance level

Question 59

What are restricted as to entrance or movement by all but authorized personnel and vehicles?

Options:

A.

Terminal operations

B.

Surveillance

C.

Total programs

D.

Controlled areas

Question 60

A project specification includes, but is not limited to, system requirements that identify:

Options:

A.

The cost of the installed system

B.

Testing specifications

C.

Equipment tolerances

D.

Performance expectations

Question 61

When reviewing an Intrusion Detection System (IDS), what type of analysis includes numeric values for probability of detection (PD), the system ' s false alarm rate (FAR), and its nuisance alarm rate (NAR)?

Options:

A.

Practical

B.

Theoretical

C.

Qualitative

D.

Quantitative

Question 62

The introduction of holography into badge control systems reduces the chance of:

Options:

A.

Theft

B.

Counterfeiting

C.

Intrusion

D.

Security

Question 63

Trimming off small amounts of money from many sources and diverting these slices into one’s own or an accomplice’s account is known as:

Options:

A.

Manipulation technique

B.

Auction planning

C.

Salami Technique

D.

Hostile applets

Question 64

Observability is the ability of the adversary to

Options:

A.

report a vulnerability.

B.

cause a vulnerability.

C.

exploit a vulnerability.

D.

recognize a vulnerability.

Question 65

What have been secured to some extent by limiting access to underground areas?

Options:

A.

Maritime operations

B.

Security measures

C.

Terminals

D.

Resealing

Question 66

In which approach of comparative negligence, the plaintiff may collect something for injuries even if he or she was primarily responsible for the injuries?

Options:

A.

Pure approach

B.

50/50 rule

C.

51 percent rule

D.

None of the above

Question 67

The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:

Options:

A.

Business continuity

B.

Business recovery

C.

Business resumption

D.

Business healing

Question 68

What allows people to log on to a remote computer and use the resources of that system if they have a valid account?

Options:

A.

Cabinet

B.

Telnet

C.

Telecom

D.

None of the above

Question 69

Which of the following is the type of sensor used to protect metal containers by sensing entry into the magnetic field that it creates around them?

Options:

A.

Photoelectric

B.

Capacitance

C.

Sonic

D.

Ultrasonic

Question 70

Equipment requirements, installation services, and ongoing maintenance services are all part of:

Options:

A.

Return-on-investment costs

B.

Needs analysis

C.

Bid specifications

D.

Cost-benefit analysis

Question 71

What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?

Options:

A.

Identity fraud

B.

Identity theft

C.

Identity dissemination

D.

Identity Distortion

Question 72

Which of the following techniques would be used to make an unauthorized key for a lock?

Options:

A.

Impressioning

B.

Rapping

C.

Bumping

D.

Decoding

Question 73

The primary functions of a physical protection system are:

Options:

A.

Prevention, detection, and response

B.

Detection, delay, and response

C.

Delay, response, and deterrence

D.

Deterrence, detection, and response

Question 74

Several fur coats were stolen from the first floor of a retail store. The security manager and store manager decide to relocate the coat department to the second floor and install a video surveillance system and anti-theft tags. New rules are also put in effect limiting the number of coats that can be taken off the racks at any one time. These actions can be defined as

Options:

A.

risk avoidance.

B.

risk reduction.

C.

risk acceptance.

D.

risk transfer.

Question 75

The planning phase of a physical protection system implementation produces which two of the following very important work products?

Options:

A.

Design requirements and sole-source justification

B.

Cost and equipment list

C.

Contract information and bidder instructions

D.

Drawings and preliminary design

Question 76

Which of the following error-rate combinations with a biometric entry control device provides the highest level of security?

Options:

A.

Low false acceptance and low false rejection

B.

Low false acceptance and high false rejection

C.

High false acceptance and high false rejection

D.

High false acceptance and low false rejection

Question 77

What are wide-beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier?

Options:

A.

Floodlights

B.

Search lights

C.

Perimeter lighting

D.

Fresnel Lenses

Question 78

The relationship between the two groups continues to be strained because of which key issue?

Options:

A.

Perceived competition

B.

Provision of services in borderline of responsibility

C.

Moonlight policies for public police

D.

All of the above

Question 79

Premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents, usually intended to influence an audience is called:

Options:

A.

Theft

B.

Terrorism

C.

Violence

D.

Criminal approach

Question 80

A set of unwanted instructions executed on a computer and resulting in a variety of effects is called:

Options:

A.

Virus

B.

Worm

C.

Bug

D.

All of the above

Question 81

The system which provides an extra measure of security by requiring that exchanges take place at the entrance to each restricted area within the controlled area is called:

Options:

A.

Single pass system

B.

Contractive pass system

C.

Pass-exchange system

D.

Multiple-pass system

Question 82

If emergency exit stairwells in a high-rise building are used by tenants for convenient travel between floors, and it is permitted by local jurisdiction, the stairwell doors should be:

Options:

A.

Equipped with fail secure electric mag locks

B.

Unlocked during building occupancy (business hours)

C.

Unlocked on every fourth level except for roof access

D.

Equipped with approved access control devices and two-way intercoms

Question 83

Predictability for security purposes is mainly an indicator of:

Options:

A.

Accuracy

B.

Effectiveness

C.

Behavior

D.

Efficiency

Question 84

The sites that are partially configured but are missing the central computer are called:

Options:

A.

Hot sites

B.

Warm sites

C.

Cold sites

D.

Frequent sites

Question 85

Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?

Options:

A.

Transmission Control protocol

B.

File Transfer protocol

C.

Information Control protocol

D.

None of the above

Question 86

What can be used as servers and do not require special installation?

Options:

A.

Workstations

B.

Minicomputers

C.

Supercomputers

D.

None of the above

Question 87

WANs used which protocol developed by the Consultative Committee for International Telephone and Telegraph.

Options:

A.

X.25

B.

XA.10

C.

CXA 1.23

D.

X.20

Question 88

Which one of the following options should be considered with respect to the issuance of weapons?

Options:

A.

Public perception

B.

Record of shift absences

C.

Physical fitness of the security officer

D.

Conditions when equipment may be utilized

Question 89

The MOST obvious security problem resulting from using a master-keying system is that

Options:

A.

an unauthorized master key permits access through any lock in the series.

B.

the number of combinations that may be used increases.

C.

if the core is removed from the lock, a flat tool can operate the mechanism.

D.

extremely close tolerances make lock-picking easier.

Question 90

__________ is a plant, building, office, institution, or any commercial or industrial structure or complex with all the attendant structures and functions that are part of an integrated operation.

Options:

A.

Facility

B.

Contents

C.

Interior

D.

Padlocks

Question 91

When designing a security program, establishing performance requirements increases the effectiveness of the program by

Options:

A.

validating that regulations and requirements have been satisfied as part of the security design.

B.

selecting security features that contribute and enhance performance to the overall strategy.

C.

ensuring that the security features used are properly certified for the purpose they are selected for.

D.

helping to create a checklist type validation that all components have the specific features required.

Question 92

Which of the following is a key factor to be considered when evaluating whether a particular facility is at risk for a bombing?

Options:

A.

Is the building located in a densely populated, urban area?

B.

Are any nearby buildings a likely target of attack?

C.

Does the building have a high occupancy rate?

D.

Are the building tenants in both domestic and international businesses?

Question 93

A threat source differentiates the potential of one facility to be attacked versus another in a different location. This activity is referred to as:

Options:

A.

Targeting

B.

Motivation

C.

Collusion

D.

Desire

Question 94

What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?

Options:

A.

Strict liability

B.

Plaintiff

C.

Defendant

D.

None of the above

Question 95

Security services in which the security force is hired and controlled directly by the protected organization are called:

Options:

A.

Proprietary

B.

Security enforcement

C.

Pilferage

D.

Contract security services

Question 96

A voluntary and intentional violation by a legally competent parson of a legal duty that commands or prohibits an act for the protection of society is known as:

Options:

A.

Corruption

B.

Law-breaking

C.

Fault

D.

Crime

Question 97

To identify and classify risk, it is necessary to examine all activities and relationships of a facility and develop answers to which of the following three basic considerations?

Options:

A.

Assets, exposure, and losses

B.

Losses, assets, and countermeasures

C.

Countermeasures, exposure, and assets

D.

Resources, assets, and countermeasures

Question 98

Which of the following are the three types of cost estimates used in the implementation of a physical protection system?

Options:

A.

Preliminary design, final design, and maintenance

B.

Budgetary, preliminary design, and final design

C.

Budgetary, preliminary design, and contingency

D.

Preliminary design, final design, and contingency

Question 99

What must be accomplished to accurately determine the financial and operational impact that could result from an interruption of enterprise operations?

Options:

A.

Enterprise impact analysis

B.

Managerial impact analysis

C.

Critical process impact

D.

Business impact analysis

Question 100

Some people emerge as experts who then sell their expertise for a fee; these people are commonly referred to as:

Options:

A.

Respondents

B.

Consultants

C.

Directors

D.

Professionals

Question 101

Strategies for risk treatment are determined by the

Options:

A.

organization ' s top management.

B.

organization ' s lead security manager.

C.

insurance carrier responsible for loss.

D.

managers in direct oversight of the assets.

Question 102

In the procurement process, the pre-bid conference provides the contractor:

Options:

A.

An opportunity for contractors to submit proposals for the project anonymously

B.

An opportunity to ask for any clarifications about information contained in the bid documents

C.

An opportunity to ask other contractors to estimate the total cost of their proposal for comparison

D.

An opportunity for the owner or owner ' s representative to disclose the expected cost of the project

Question 103

When evaluating risk, what factor describes the state of being susceptible to harm or injury?

Options:

A.

Threat

B.

Criticality

C.

Likelihood

D.

Vulnerability

Question 104

Theft triangle consists of:

Options:

A.

dander, desire, opportunity

B.

motive, condition, opportunity

C.

motive, desire, opportunity

D.

dishonesty, financial problem, prospect

Question 105

Video surveillance camera selection should be based primarily on the:

Options:

A.

Horizontal resolution of the camera

B.

Number of pixels generated by the chip

C.

Sensitivity required for a full video-output signal

D.

Focal length

Question 106

Which of the following statements does not describe characteristics applicable to perimeter lighting?

Options:

A.

Lighting fixtures for perimeter illumination can be mounted on buildings and structures near the perimeter

B.

Light should be directed toward the protected area

C.

Floodlights and Fresnel lenses are often used to illuminate isolated fence boundaries

D.

Mounting height is a primary determinant of lighting levels outside the perimeter boundary

Question 107

_______ requires that the arrestee be turned over to the authorities as soon as practicable and in any event without unreasonable delay.

Options:

A.

Arrest

B.

Detain

C.

Detention

D.

Threatening loss

Question 108

Businesses have been forced to come to terms with potential consequences of taking security risks and the solution which should be complementary is:

Options:

A.

Investment in loss prevention techniques

B.

Insurance

C.

Both A and B

D.

Neither A nor B

Question 109

A good risk management program involves:

Options:

A.

Identify risks or specific vulnerabilities

B.

Analyze and study risks, including likelihood and degree of danger of an event

C.

Study of security programs

D.

All of the above

Question 110

The common practices in recruiting a jihadist are:

Options:

A.

identifying individuals with appropriate ideology

B.

indoctrination

C.

training and preparation for the terrorist act

D.

All of the above

Question 111

The annual loss expectancy (ALE) formula is based on:

Options:

A.

Impact and loss

B.

Risk and mitigation

C.

Frequency and risk

D.

Impact and frequency

Question 112

Which terrorism requires organization and some type of leadership, recruitment, training, and retention of members?

Options:

A.

Individual terrorism

B.

Modern terrorism

C.

Group terrorism

D.

State terrorism

Page: 1 / 38
Total 375 questions