Physical Security Professional (PSP) Exam Questions and Answers
A bidder instruction document includes verification of:
What are wide-beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier?
Which of the following documents would a contractor submit to a project manager if work outside of the specified scope had to be performed?
Asset value is determined by which of the following elements?
Which of the following error-rate combinations with a biometric entry control device provides the highest level of security?
When conducting a risk analysis, the BEST way to state the impact of an adverse event or circumstance is to express it as:
What generally means removing the risk to the company by paying for the protection of an insurance policy?
A security manager performing a site survey using crime prevention through environmental design (CPTED) techniques would MOST likely recommend:
Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.
A civil action based on the principle that one individual can expect certain behavior from another individual is known as:
What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?
Using CCTV from a remote command center to control access and egress for an office complex will require:
Which of the following is an example of an intangible asset?
Which of the following is the type of sensor used to protect metal containers by sensing entry into the magnetic field that it creates around them?
Which of the following is an example of a tangible asset?
For typical CCTV surveillance, which of the following common surfaces has the lowest reflectance?
___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.
When exterior lighting is employed, an initial survey is conducted at lighting installation, and then
A good hybrid security operation consists of which component?
Which of the following verifications is included in a security system acceptance test?
Security services in which the security force is hired and controlled directly by the protected organization are called:
Which alarm warn of a process reaching a dangerous temperature, of the presence of toxic fumes, or that a machine is running too fast?
After completing a thorough risk analysis, company personnel decide to manage risks by removing them from the company and paying for protection by purchasing an insurance policy. This form of risk management is known as risk:
What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?
Which of the following types of post-implementation testing is MOST likely to involve the use of measuring devices, calibrated instruments, or special methods?
The three keys to a successful contact are:
Criteria for intrusion sensor performance is typically measured by which of the following?
Concerns itself with those means by which a given facility protects itself against theft and any natural disasters is called:
What must be thought of as supportive of security operations rather than as the principal defense?
Nuisance alarm rate is calculated by knowing which of the following?
From a management point of view, organizing the security effort involves:
_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.
Which of the following sensor types would be least effective in detecting unauthorized access to a safe?
During project management, which of the following deliverables are part of the design phase?
The process of finding the person best qualified for the job in terms of both skills and personal integrity is known as:
Which sensor is commonly used on doors and/or windows?
The concept of __________ arises from agency law in which one party has the power to control the actions of another party involved in the contract or relationship.
A person who already knows and understands the basics of loss prevention and security is known as:
A threat assessment and a vulnerability analysis are parts of the:
If emergency exit stairwells in a high-rise building are used by tenants for convenient travel between floors, and it is permitted by local jurisdiction, the stairwell doors should be:
The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:
What signal the entry of persons into a facility or an area while the system is in operation?
Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:
Which type of testing would BEST demonstrate to clients that a completed security system ' s physical and functional requirements comply with the contract requirements?
Successful implementation of any physical security construction project hinges largely on a well-defined and executed:
The process of planning for response, recovery, and resumption activities for the infrastructure, critical processes and other elements is known as:
What are the three common categories of risk?
A controlled area where an even greater degree of security is required is called:
A security supervisor is evaluating access to control devices for the data center. The option that provides the highest level of security is
What is a significant issue in the operation of intrusion detection systems?
When planning for a new security initiative, the FIRST thing to do is
If a series of interior sensors is connected to a single alarm processor, line supervision is required between the processor and each
In ___________, air has been reduced or fuel is dwindling to the point where there is no visible flame, just an entire area filled with tremendous heat.
Electromechanical and electromagnetic locks are considered fail-safe if they:
Which of the following types of procurement is most frequently used when a customer has intimate knowledge of the requirements defined and the systems available in the market?
Who must regularly study and analyze the channels of communication to be certain that the input they receive is accurate, relevant, timely, concise and informative?
Libel is oral defamation; libel is defamation through the written word.
When a bomb threat is received and identifies a specific floor as containing the bomb, the initial building evacuation should focus on the affected floor and:
A concept that has grown largely in response to the difficulties faced by merchants in protecting their property from shoplifters and the problems and dangers they face when they make an asset, is called:
For typical video surveillance, which of the following common surfaces has the lowest reflectance?
The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.
What can be used as servers and do not require special installation?
Which of the following consumes the greatest portion of a project manager ' s time over the life of a project?
A temporary endeavor to accomplish a unique process is called a:
Security system maintenance specifications should state that all hardware and software updates and upgrades be:
An owner ' s acceptance of a security system marks the beginning of:
At a minimum, the Physical Protection System (PPS) procurement package consists of:
One example of a company’s intangible assets would be its:
Effective protective systems integrate each of the following supporting elements except:
To use _____________ for the storage of valuables subject to theft, an all too common practice is to invite disaster.
In recommending deadbolt locks, the minimum throw of the deadbolt to provide adequate protection against jamb spreading is
Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:
To protect a company and its assets, the FIRST step is to perform a/an
A system in which installation circuits are connected to local police or fire departments or 911 centers by leased telephone lines is called;
Which one of the following options should be included in post orders?
A business impact analysis is used to help management and the business continuity planner decide:
When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:
Which of the following is NOT the category of contingency planning program?
When yard space and warehousing is required even in urban areas, __________ is the boundary of the property owned by the company.
Contingency planning is the result of which four major components?
The type of electric locking device that permits free mechanical egress from the protected side of the door is the:
Strategies for risk treatment are determined by the
Which of the following is Correct?
Which law concerns the rights, duties, and penalties of individuals in their relationship with each other?
Which of the following is NOT the type of viruses?
In risk assessment and management, predictability for security purposes is mainly an indicator of
What have been secured to some extent by limiting access to underground areas?
When budgeting for replacement of physical security systems it is important to understand the opportunity for technology upgrades. A consideration should include:
For preventive maintenance to be effective, each piece of equipment to be maintained must have documentation that includes:
The degree to which a manager or supervisor is able to delegate responsibility rather than trying to do everything personally is a good measure of managerial ability.
In its organizational functions, security encompasses which basic activities with varying degrees of emphasis?
The term probability of detection BEST describes the:
Which of the following BEST mitigates the risk of power loss in a computer?
The classic triangle frequently referred to in describing the nature of fire consists of:
Removing the problem by eliminating the risk is known as:
A device that sends a signal about whatever is sensed to some other location is called:
Premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents, usually intended to influence an audience is called:
Which of the following is NOT the alternative of optimizing risk management?
Which of the following is NOT the advantage of proprietary officers?
The process of pre-qualifying vendors before issuing the request for proposal (RFP) helps to ensure that:
The primary advantages of using proprietary security are:
An example of preventive maintenance for a physical protection system PPS includes
Which of the following are the three types of cost estimates used in the implementation of a physical protection system?
Decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss is called:
A good risk management program involves:
Which of the following BEST describes the operation of a passive infrared sensor?
During an attack, the critical detection point occurs when the remaining attack path exceeds:
The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?
Some people are willing to copy software and resell it or give it away; this authorized copying of copyrighted computer programs is called:
A Physical Security Professional ' s analysis of data collected during a risk analysis helps
Which of the following is true of proximity badges?
System integration is the process of combining individual technology elements, procedures, and which of the following into one system for providing security at a facility?