Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

ASIS ASIS-PSP Dumps

Page: 1 / 38
Total 375 questions

Physical Security Professional (PSP) Exam Questions and Answers

Question 1

A bidder instruction document includes verification of:

Options:

A.

Experience and warranties

B.

Experience and licenses

C.

Licenses and financial statements

D.

Licenses and warranties

Question 2

What are wide-beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier?

Options:

A.

Floodlights

B.

Search lights

C.

Perimeter lighting

D.

Fresnel Lenses

Question 3

Which of the following documents would a contractor submit to a project manager if work outside of the specified scope had to be performed?

Options:

A.

Schedule-of-values request

B.

Change-order request

C.

Scope change request

D.

Justification for change request

Question 4

Asset value is determined by which of the following elements?

Options:

A.

Ease of replacement, some measure of value, and original cost

B.

Original cost, criticality, and ease of replacement

C.

Value, original cost, and criticality

D.

Criticality, ease of replacement, and some measure of value

Question 5

Which of the following error-rate combinations with a biometric entry control device provides the highest level of security?

Options:

A.

Low false acceptance and low false rejection

B.

Low false acceptance and high false rejection

C.

High false acceptance and high false rejection

D.

High false acceptance and low false rejection

Question 6

When conducting a risk analysis, the BEST way to state the impact of an adverse event or circumstance is to express it as:

Options:

A.

Monetary value

B.

Cost-benefit ratio

C.

Downtime estimate

D.

Frequency-of-occurrence graph

Question 7

What generally means removing the risk to the company by paying for the protection of an insurance policy?

Options:

A.

Security

B.

Risk transfer

C.

Collateral

D.

Self-assurance

Question 8

A security manager performing a site survey using crime prevention through environmental design (CPTED) techniques would MOST likely recommend:

Options:

A.

Installing video cameras for increased surveillance

B.

Constructing a brick wall as a barrier

C.

Planting trees for boundary control

D.

Installing revolving doors for entry control

Question 9

Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.

Options:

A.

business continuity, business recovery

B.

business recovery, business resumption

C.

business recovery, business continuity

D.

business continuity, business resources

Question 10

A civil action based on the principle that one individual can expect certain behavior from another individual is known as:

Options:

A.

Transitivity

B.

Tort

C.

Reassembly

D.

Procurement

Question 11

What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?

Options:

A.

Identity fraud

B.

Identity theft

C.

Identity dissemination

D.

Identity Distortion

Question 12

Using CCTV from a remote command center to control access and egress for an office complex will require:

Options:

A.

Continuous monitoring by control center personnel

B.

Two-way voice communication between persons at the entry and persons at the control points

C.

The outputs from each camera to be displayed at all times

D.

Rapid visual analysis by a trained operator

Question 13

Which of the following is an example of an intangible asset?

Options:

A.

Land

B.

Buildings

C.

Natural resources

D.

Intellectual property

Question 14

Which of the following is the type of sensor used to protect metal containers by sensing entry into the magnetic field that it creates around them?

Options:

A.

Photoelectric

B.

Capacitance

C.

Sonic

D.

Ultrasonic

Question 15

Which of the following is an example of a tangible asset?

Options:

A.

Humans

B.

Information

C.

Reputation

D.

Trademarks

Question 16

For typical CCTV surveillance, which of the following common surfaces has the lowest reflectance?

Options:

A.

A snow-covered field

B.

Dry, sandy soil

C.

Asphalt

D.

A red brick building

Question 17

___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.

Options:

A.

Potential

B.

Capability

C.

Honesty

D.

Aptitude

Question 18

When exterior lighting is employed, an initial survey is conducted at lighting installation, and then

Options:

A.

weekly.

B.

monthly.

C.

semi-annually.

D.

annually.

Question 19

A good hybrid security operation consists of which component?

Options:

A.

engaged corporate liaison

B.

consistent contract management support

C.

accurate quality measurements

D.

All of the above

Question 20

Which of the following verifications is included in a security system acceptance test?

Options:

A.

Cameras are aimed and focused properly

B.

Owner can operate the systems without assistance

C.

Cameras facing the rising or setting sun utilize wide dynamic range

D.

System operates as expected 24 hours per day for 15 consecutive calendar days

Question 21

Security services in which the security force is hired and controlled directly by the protected organization are called:

Options:

A.

Proprietary

B.

Security enforcement

C.

Pilferage

D.

Contract security services

Question 22

Which alarm warn of a process reaching a dangerous temperature, of the presence of toxic fumes, or that a machine is running too fast?

Options:

A.

Burglar alarm

B.

Special-use alarm

C.

Intrusion alarms

D.

Protection alarm

Question 23

After completing a thorough risk analysis, company personnel decide to manage risks by removing them from the company and paying for protection by purchasing an insurance policy. This form of risk management is known as risk:

Options:

A.

Avoidance

B.

Transfer

C.

Reduction

D.

Spreading

Question 24

What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?

Options:

A.

Strict liability

B.

Plaintiff

C.

Defendant

D.

None of the above

Question 25

Which of the following types of post-implementation testing is MOST likely to involve the use of measuring devices, calibrated instruments, or special methods?

Options:

A.

Operational

B.

Performance

C.

Subsystem

D.

Post-maintenance

Question 26

The three keys to a successful contact are:

Options:

A.

accessibility, reviews and resource management

B.

accessibility, meetings and performance

C.

accessibility, meetings and resource management

D.

measurement, meetings and resource management

Question 27

Criteria for intrusion sensor performance is typically measured by which of the following?

Options:

A.

Alarm rate probability, nuisance alarm rate, and vulnerability to defeat

B.

Probability to detect, nuisance alarm rate, and vulnerability assessment

C.

Alarm rate probability, annunciation rate, and vulnerability to defeat

D.

Probability to detect, nuisance alarm rate, and vulnerability to defeat

Question 28

Concerns itself with those means by which a given facility protects itself against theft and any natural disasters is called:

Options:

A.

refuge

B.

Physical security

C.

safety measures

D.

precautions

Question 29

What must be thought of as supportive of security operations rather than as the principal defense?

Options:

A.

Insurance

B.

Loss-prevention

C.

Premiums

D.

Bonds

Question 30

Nuisance alarm rate is calculated by knowing which of the following?

Options:

A.

Reviewing the sensor applications of the nuisance alarm

B.

The response times for each nuisance alarm divided by a given time period

C.

The ratio of nuisance alarms to real alarms

D.

The number of nuisance alarms received over a given time period

Question 31

From a management point of view, organizing the security effort involves:

Options:

A.

Planning & goal setting

B.

Establishing controls

C.

Hiring personnel

D.

All of the above

Question 32

_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.

Options:

A.

Program Valuation

B.

Risk analysis

C.

Security survey

D.

Performance audit

Question 33

Which of the following sensor types would be least effective in detecting unauthorized access to a safe?

Options:

A.

Capacitance proximity

B.

Microwave

C.

Infrared beam

D.

Fiberoptic cable

Question 34

During project management, which of the following deliverables are part of the design phase?

Options:

A.

Recommended safeguards and sole-source justification

B.

Implementation schedule, bidder instructions, and security-device schedules

C.

Cost evaluations and due-diligence results

D.

Equipment lists

Question 35

The process of finding the person best qualified for the job in terms of both skills and personal integrity is known as:

Options:

A.

Inspection

B.

Recruitment

C.

Vetting

D.

Screening

Question 36

Which sensor is commonly used on doors and/or windows?

Options:

A.

Capacitance

B.

Electromechanical

C.

Infrasonic

D.

Fiber optic

Question 37

The concept of __________ arises from agency law in which one party has the power to control the actions of another party involved in the contract or relationship.

Options:

A.

Compliance liability

B.

Vicarious liability

C.

Active liability

D.

Passive liability

Question 38

A person who already knows and understands the basics of loss prevention and security is known as:

Options:

A.

Engaged liaison

B.

Review personnel

C.

Supportive person

D.

None of the above

Question 39

A threat assessment and a vulnerability analysis are parts of the:

Options:

A.

Operating security review

B.

Project feasibility study

C.

Preliminary design

D.

Security systems architecture

Question 40

If emergency exit stairwells in a high-rise building are used by tenants for convenient travel between floors, and it is permitted by local jurisdiction, the stairwell doors should be:

Options:

A.

Equipped with fail secure electric mag locks

B.

Unlocked during building occupancy (business hours)

C.

Unlocked on every fourth level except for roof access

D.

Equipped with approved access control devices and two-way intercoms

Question 41

The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:

Options:

A.

Analysis

B.

Integrity

C.

Security

D.

Availability

Question 42

What signal the entry of persons into a facility or an area while the system is in operation?

Options:

A.

Invasions

B.

Access door

C.

Intrusion alarms

D.

Protection alarms

Question 43

Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:

Options:

A.

Unrecognized holds

B.

Hold-on liabilities

C.

Hold harmless clauses

D.

None of the above

Question 44

Which type of testing would BEST demonstrate to clients that a completed security system ' s physical and functional requirements comply with the contract requirements?

Options:

A.

Site acceptance testing

B.

Post implementation testing

C.

Reliability or availability testing

D.

Pre-delivery or factory acceptance testing

Question 45

Successful implementation of any physical security construction project hinges largely on a well-defined and executed:

Options:

A.

Request for quotation

B.

Business impact analysis

C.

Procurement contract

D.

Cost analysis

Question 46

The process of planning for response, recovery, and resumption activities for the infrastructure, critical processes and other elements is known as:

Options:

A.

Contingent planning

B.

Continuity planning

C.

Resource planning

D.

Resumption planning

Question 47

What are the three common categories of risk?

Options:

A.

Personnel, property, and hazards

B.

Property, financial, and liability

C.

Personnel, property, and liability

D.

Hazards, personnel, and liability

Question 48

A controlled area where an even greater degree of security is required is called:

Options:

A.

Limited area

B.

Pass system area

C.

Multiple areas

D.

External area

Question 49

A security supervisor is evaluating access to control devices for the data center. The option that provides the highest level of security is

Options:

A.

a proximity card.

B.

a computer-controlled keypad.

C.

a smart card.

D.

retinal pattern recognition.

Question 50

What is a significant issue in the operation of intrusion detection systems?

Options:

A.

Fail safe and fail secure

B.

False positives and false negatives

C.

Management knowledge of how it works

D.

Over-reliance on manual surveillance

Question 51

When planning for a new security initiative, the FIRST thing to do is

Options:

A.

establish a budget.

B.

complete a security survey.

C.

gain the support of upper management.

D.

ensure that the appropriate equipment is selected.

Question 52

If a series of interior sensors is connected to a single alarm processor, line supervision is required between the processor and each

Options:

A.

parallel loop.

B.

detection sensor.

C.

T-tap.

D.

group of detection sensors.

Question 53

In ___________, air has been reduced or fuel is dwindling to the point where there is no visible flame, just an entire area filled with tremendous heat.

Options:

A.

Smoldering burning

B.

Ignition stage

C.

Last stage

D.

Incipient stage

Question 54

Electromechanical and electromagnetic locks are considered fail-safe if they:

Options:

A.

Can be deactivated remotely by the fire alarm system

B.

Remain locked when the power is removed

C.

Remain unlocked when the power is removed

D.

Resist tampering

Question 55

Which of the following types of procurement is most frequently used when a customer has intimate knowledge of the requirements defined and the systems available in the market?

Options:

A.

Invitation to bid

B.

Request for proposals

C.

Sole source

D.

Request for quote

Question 56

Who must regularly study and analyze the channels of communication to be certain that the input they receive is accurate, relevant, timely, concise and informative?

Options:

A.

Chief Information Officer

B.

Information Security Information Officer

C.

Chief Minister

D.

Chief Security Officer

Question 57

Libel is oral defamation; libel is defamation through the written word.

Options:

A.

True

B.

False

Question 58

When a bomb threat is received and identifies a specific floor as containing the bomb, the initial building evacuation should focus on the affected floor and:

Options:

A.

The immediate area

B.

The floors immediately above and below

C.

All floors above

D.

All floors below

Question 59

A concept that has grown largely in response to the difficulties faced by merchants in protecting their property from shoplifters and the problems and dangers they face when they make an asset, is called:

Options:

A.

Release

B.

Confinement

C.

Detention

D.

None of the above

Question 60

For typical video surveillance, which of the following common surfaces has the lowest reflectance?

Options:

A.

A snow-covered field

B.

Dry, sandy soil

C.

Asphalt

D.

A red brick building

Question 61

The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.

Options:

A.

True

B.

False

Question 62

What can be used as servers and do not require special installation?

Options:

A.

Workstations

B.

Minicomputers

C.

Supercomputers

D.

None of the above

Question 63

Which of the following consumes the greatest portion of a project manager ' s time over the life of a project?

Options:

A.

Documentation

B.

Meetings

C.

Planning

D.

Control

Question 64

A temporary endeavor to accomplish a unique process is called a:

Options:

A.

Scope of work

B.

Work breakdown structure

C.

Project

D.

System

Question 65

Security system maintenance specifications should state that all hardware and software updates and upgrades be:

Options:

A.

Installed until the end-of-life of the product

B.

Included as part of the service level agreement

C.

Installed at no cost under provisions of the warranty

D.

Included in a software maintenance agreement

Question 66

An owner ' s acceptance of a security system marks the beginning of:

Options:

A.

The warranty period

B.

Phase II assessment

C.

Phase II testing

D.

Site acceptance testing

Question 67

At a minimum, the Physical Protection System (PPS) procurement package consists of:

Options:

A.

Product specs, budgets, and contact information

B.

Contractor reference requirements, functional specifications, and as-built drawings

C.

Contract information and bidders ' instructions, system specifications, and drawings

D.

Training requirements, instruction manuals, and maintenance instructions

Question 68

One example of a company’s intangible assets would be its:

Options:

A.

Patents

B.

Reputation

C.

Digital files

D.

Obsolete equipment

Question 69

Effective protective systems integrate each of the following supporting elements except:

Options:

A.

The assets to be protected, the threat to those assets, and the applicable risk levels

B.

Terrorism countermeasures that protect assets against terrorist attacks

C.

Procedural security measures including procedures in place before an incident and those used in response to an incident

D.

Physical protective measures including barriers, lighting, and electronic security systems

Question 70

To use _____________ for the storage of valuables subject to theft, an all too common practice is to invite disaster.

Options:

A.

Fire-resistance safes

B.

Control safes

C.

Record safes

D.

Resistive safes

Question 71

In recommending deadbolt locks, the minimum throw of the deadbolt to provide adequate protection against jamb spreading is

Options:

A.

1/2 inch 1.3 centimeters

B.

5/8 inch 1.6 centimeters

C.

3/4 inch 1.9 centimeters

D.

1 inch 2.5 centimeters

Question 72

Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:

Options:

A.

Random memory

B.

Scavenging memory

C.

Awaiting memory

D.

Search memory

Question 73

To protect a company and its assets, the FIRST step is to perform a/an

Options:

A.

business impact analysis.

B.

operational cost analysis.

C.

threat and vulnerability analysis.

D.

cost–benefit analysis.

Question 74

A system in which installation circuits are connected to local police or fire departments or 911 centers by leased telephone lines is called;

Options:

A.

Central station

B.

Proprietary system

C.

Local alarm system

D.

Auxiliary system

Question 75

Which one of the following options should be included in post orders?

Options:

A.

Review shift log with relieving officer

B.

Express the policies of the protected enterprise

C.

Verbal instructions override the written instructions

D.

Express the policies of the local authority having jurisdiction

Question 76

A business impact analysis is used to help management and the business continuity planner decide:

Options:

A.

The budget for the program

B.

How to best allocate personnel resources during a disaster

C.

The number of hot sites

D.

Which functions are critical to the continued operation of the organization

Question 77

When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:

Options:

A.

Financial authority

B.

Control authority

C.

Staff authority

D.

Dominance authority

Question 78

Which of the following is NOT the category of contingency planning program?

Options:

A.

those that impact the business infrastructure

B.

those that impact the people

C.

those that impact the processes

D.

those that impact the reputation of the business

Question 79

When yard space and warehousing is required even in urban areas, __________ is the boundary of the property owned by the company.

Options:

A.

Fence

B.

Wall

C.

Perimeter

D.

Chain link

Question 80

Contingency planning is the result of which four major components?

Options:

A.

emergency response, crisis management, pressure devices, risk analysis

B.

emergency response, crisis management, business recovery, business resumption

C.

basic planning, crisis management, business recovery, business resumption

D.

under investigation, crisis management, business recovery, pressure devices

Question 81

The type of electric locking device that permits free mechanical egress from the protected side of the door is the:

Options:

A.

Vertical pin

B.

Electromagnetic

C.

Electric strike

D.

Delayed egress

Question 82

Strategies for risk treatment are determined by the

Options:

A.

organization ' s top management.

B.

organization ' s lead security manager.

C.

insurance carrier responsible for loss.

D.

managers in direct oversight of the assets.

Question 83

Which of the following is Correct?

Options:

A.

in 51 percent rule of comparative negligence, the plaintiff’s acts must have contributed less than 50 percent of the situation in order to collect damages.

B.

in 51 percent rule of comparative negligence, the plaintiff’s acts must not have contributed less than 49 percent of the situation in order to collect damages.

C.

in 51 percent rule of comparative negligence, the plaintiff’s acts must not have contributed less than 48 percent of the situation in order to collect damages.

D.

in 51 percent rule of comparative negligence, the plaintiff’s acts must not have contributed less than 51 percent of the situation in order to collect damages.

Question 84

Which law concerns the rights, duties, and penalties of individuals in their relationship with each other?

Options:

A.

Procedural law

B.

Statutes suit

C.

Substantive law

D.

Constructive law

Question 85

Which of the following is NOT the type of viruses?

Options:

A.

Innocuous Virus

B.

Humorous Virus

C.

Hostile Virus

D.

Altering Virus

Question 86

In risk assessment and management, predictability for security purposes is mainly an indicator of

Options:

A.

behavior.

B.

crisis management deterrence.

C.

event history.

D.

countermeasure effectiveness.

Question 87

What have been secured to some extent by limiting access to underground areas?

Options:

A.

Maritime operations

B.

Security measures

C.

Terminals

D.

Resealing

Question 88

When budgeting for replacement of physical security systems it is important to understand the opportunity for technology upgrades. A consideration should include:

Options:

A.

Ongoing maintenance

B.

Integration of small systems

C.

Reconfiguration of equipment

D.

Accelerating obsolescence of equipment

Question 89

For preventive maintenance to be effective, each piece of equipment to be maintained must have documentation that includes:

Options:

A.

The mean time between failures (MTBF)

B.

System performance reports

C.

Component failure rates

D.

Manufacturer specifications

Question 90

The degree to which a manager or supervisor is able to delegate responsibility rather than trying to do everything personally is a good measure of managerial ability.

Options:

A.

True

B.

False

Question 91

In its organizational functions, security encompasses which basic activities with varying degrees of emphasis?

Options:

A.

managerial, detective, preventive, investigative

B.

supervising, administrative, preventive, training

C.

managerial, training, preventive, detective

D.

managerial, administrative, preventive, investigative

Question 92

The term probability of detection BEST describes the:

Options:

A.

Criteria evaluated during system validation testing

B.

Security officer response percentage

C.

Effectiveness of an electronic security system

D.

Time between initial detection and occurrence of response

Question 93

Which of the following BEST mitigates the risk of power loss in a computer?

Options:

A.

Surge protector

B.

Uninterrupted power supply

C.

Emergency generator

D.

Batteries

Question 94

The classic triangle frequently referred to in describing the nature of fire consists of:

Options:

A.

heat, fuel, oxygen

B.

heat, light, oxygen

C.

heat, smoke, oxygen

D.

heat, carbon dioxide, oxygen

Question 95

Removing the problem by eliminating the risk is known as:

Options:

A.

Risk avoidance

B.

Risk prevention

C.

Risk reduction

D.

Risk elimination

Question 96

A device that sends a signal about whatever is sensed to some other location is called:

Options:

A.

Signal device

B.

Circuit device

C.

Wave device

D.

Line device

Question 97

Premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents, usually intended to influence an audience is called:

Options:

A.

Theft

B.

Terrorism

C.

Violence

D.

Criminal approach

Question 98

Which of the following is NOT the alternative of optimizing risk management?

Options:

A.

Risk avoidance

B.

Risk assessment

C.

Risk transfer

D.

Risk spreading

Question 99

Which of the following is NOT the advantage of proprietary officers?

Options:

A.

Quality of personnel

B.

Loyalty

C.

Impartiality

D.

Prestige

Question 100

The process of pre-qualifying vendors before issuing the request for proposal (RFP) helps to ensure that:

Options:

A.

All applicable codes are enforced

B.

Only credible and competent vendors bid on the project

C.

Only financially secure vendors bid on the project

D.

All specifications of the project are met

Question 101

The primary advantages of using proprietary security are:

Options:

A.

Quality of personnel, control of forces, loyalty, and prestige

B.

Quality of personnel, administration requirements, and expertise

C.

Cost, loyalty, and control of guard forces

D.

Expertise, ability to discipline and reward, and cost

Question 102

An example of preventive maintenance for a physical protection system PPS includes

Options:

A.

investigating the system problem.

B.

updating system and application software.

C.

restoring the system or returning its use to the customer.

D.

updating system documentation with respect to the problem and its resolution.

Question 103

Which of the following are the three types of cost estimates used in the implementation of a physical protection system?

Options:

A.

Preliminary design, final design, and maintenance

B.

Budgetary, preliminary design, and final design

C.

Budgetary, preliminary design, and contingency

D.

Preliminary design, final design, and contingency

Question 104

Decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss is called:

Options:

A.

Risk diffusion

B.

Risk production

C.

Risk spreading

D.

Risk protection

Question 105

A good risk management program involves:

Options:

A.

Identify risks or specific vulnerabilities

B.

Analyze and study risks, including likelihood and degree of danger of an event

C.

Study of security programs

D.

All of the above

Question 106

Which of the following BEST describes the operation of a passive infrared sensor?

Options:

A.

Detecting moving infrared radiation against the radiation environment of the room

B.

Transmitting and receiving infrared radiation, then detecting any changes in signals

C.

Transmitting infrared radiation into the environment of the room and detecting the changes

D.

Detecting infrared radiation and analyzing the reflection data

Question 107

During an attack, the critical detection point occurs when the remaining attack path exceeds:

Options:

A.

Response time

B.

Probability of detection

C.

Probability of interruption

D.

Remaining delay time

Question 108

The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?

Options:

A.

International terrorism

B.

Modern terrorism

C.

Modern Revolutionary

D.

Modern War weapons

Question 109

Some people are willing to copy software and resell it or give it away; this authorized copying of copyrighted computer programs is called:

Options:

A.

Identify theft

B.

War driving

C.

Unauthorized access to software

D.

Software privacy

Question 110

A Physical Security Professional ' s analysis of data collected during a risk analysis helps

Options:

A.

make informed decisions regarding identified risks.

B.

identify peak activities that require additional countermeasures.

C.

apply the most effective technology for observed traffic patterns.

D.

communicate the costs and benefits of risk to senior management.

Question 111

Which of the following is true of proximity badges?

Options:

A.

They contain a series of parallel, embedded wires

B.

They can be scanned without being physically placed into a reader device

C.

They have personal data-encoded information embedded in the card

D.

They are read by an optical sensor that transmits information to a decoding unit

Question 112

System integration is the process of combining individual technology elements, procedures, and which of the following into one system for providing security at a facility?

Options:

A.

Safety

B.

Equipment

C.

Personnel

D.

Management

Page: 1 / 38
Total 375 questions