Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium ASIS ASIS-PSP Dumps Questions Answers

Page: 1 / 28
Total 375 questions

Physical Security Professional (PSP) Exam Questions and Answers

Question 1

The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:

Options:

A.

Analysis

B.

Integrity

C.

Security

D.

Availability

Buy Now
Question 2

An example of preventive maintenance for a physical protection system PPS includes

Options:

A.

investigating the system problem.

B.

updating system and application software.

C.

restoring the system or returning its use to the customer.

D.

updating system documentation with respect to the problem and its resolution.

Question 3

Which records provide detailed, documented records of an applicant’s personal history, background, and financial relationships?

Options:

A.

Legal action

B.

Civil lawsuit

C.

Civil litigation

D.

All of the above

Question 4

Based on their ability to meet the needs of an entire organization, which of the following stakeholders is MOST crucial to engage for a successful operation of an asset protection strategy?

Options:

A.

Security

B.

Executives

C.

IT Department

D.

Human resources

Question 5

The central station, local alarm system, auxiliary systems are all currently available systems of:

Options:

A.

Alarm monitoring systems

B.

Sonic Alarm systems

C.

Capacitance Alarm systems

D.

Motion detection systems

Question 6

To identify and classify risk, it is necessary to examine all activities and relationships of a facility and develop answers to which of the following three basic considerations?

Options:

A.

Assets, exposure, and losses

B.

Losses, assets, and countermeasures

C.

Countermeasures, exposure, and assets

D.

Resources, assets, and countermeasures

Question 7

The system which provides an extra measure of security by requiring that exchanges take place at the entrance to each restricted area within the controlled area is called:

Options:

A.

Single pass system

B.

Contractive pass system

C.

Pass-exchange system

D.

Multiple-pass system

Question 8

An owner ' s acceptance of a security system marks the beginning of:

Options:

A.

The warranty period

B.

Phase II assessment

C.

Phase II testing

D.

Site acceptance testing

Question 9

System integration is the process of combining individual technology elements, procedures, and which of the following into one system for providing security at a facility?

Options:

A.

Safety

B.

Equipment

C.

Personnel

D.

Management

Question 10

Libel is oral defamation; libel is defamation through the written word.

Options:

A.

True

B.

False

Question 11

In a physical protection system (PPS), a 4:1 light-to-dark ratio is the preferred design goal to allow for

Options:

A.

high surface reflection.

B.

high aspect ratio.

C.

environmental and degradation factors.

D.

reflected glare reduction.

Question 12

As part of an initial evaluation of the significant threats or hazards to an organization, the security practitioner should:

Options:

A.

Estimate costs

B.

Estimate the likelihood of occurrence

C.

Develop a business case for additional security equipment and staff

D.

Develop a response plan

Question 13

Microwave sensors should be mounted

Options:

A.

aimed at an exterior wall.

B.

at the height of an intruder in the area being protected.

C.

near the floor of the area being protected.

D.

near the ceiling of the area being protected.

Question 14

A temporary endeavor to accomplish a unique process is called a:

Options:

A.

Scope of work

B.

Work breakdown structure

C.

Project

D.

System

Question 15

In a low-light application, which of the following lens characteristics would allow the MOST light to enter the camera?

Options:

A.

Use of a glass lens

B.

Use of a DC iris

C.

A lower F-stop

D.

A higher F-stop

Question 16

A design that is applied to a lock keyway to make picking of the lock more difficult is known as

Options:

A.

spool.

B.

mushroom.

C.

paracentric.

D.

serrated.

Question 17

The term probability of detection BEST describes the:

Options:

A.

Criteria evaluated during system validation testing

B.

Security officer response percentage

C.

Effectiveness of an electronic security system

D.

Time between initial detection and occurrence of response

Question 18

____________ builds on confusion when two or more people take advantage of their positions and the confusion to steal.

Options:

A.

Conspiracy

B.

Accountability

C.

Invoicing

D.

Proliferation

Question 19

Which class of fire, fires and extinguishes deal with cooking oil fires?

Options:

A.

Class C

B.

Class D

C.

Class K

D.

Class L

Question 20

A corporation is in need of security personnel to guard visitor parking lots, highly sensitive projects, and top-secret projects. What is the MOST viable and cost-effective security staffing strategy for the corporation?

Options:

A.

Hybrid

B.

Contract

C.

Proprietary

D.

Total systems

Question 21

In the context of risk, which of the following is considered a hazard?

Options:

A.

The possible occurrence of an event

B.

The probable occurrence of an event

C.

The difference between actual and expected losses

D.

A contributing factor to a peril

Question 22

From a management point of view, organizing the security effort involves:

Options:

A.

Planning & goal setting

B.

Establishing controls

C.

Hiring personnel

D.

All of the above

Question 23

Document the events, circumstances, and chronology and prepare a “lesson learned” review are the primary parts of:

Options:

A.

Testing

B.

Quality assurance

C.

After action

D.

All of the above

Question 24

The planning phase of a physical protection system implementation produces which two of the following very important work products?

Options:

A.

Design requirements and sole-source justification

B.

Cost and equipment list

C.

Contract information and bidder instructions

D.

Drawings and preliminary design

Question 25

Which of the following should prospects submit to qualify for a physical security project?

Options:

A.

Intent-to-bid letter

B.

Customer references

C.

Bidder ' s questionnaire

D.

Executive biographies

Question 26

A Physical Security Professional ' s analysis of data collected during a risk analysis helps

Options:

A.

make informed decisions regarding identified risks.

B.

identify peak activities that require additional countermeasures.

C.

apply the most effective technology for observed traffic patterns.

D.

communicate the costs and benefits of risk to senior management.

Question 27

The annual loss expectancy (ALE) formula is based on:

Options:

A.

Impact and loss

B.

Risk and mitigation

C.

Frequency and risk

D.

Impact and frequency

Question 28

What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?

Options:

A.

Identity fraud

B.

Identity theft

C.

Identity dissemination

D.

Identity Distortion

Question 29

A civil action based on the principle that one individual can expect certain behavior from another individual is known as:

Options:

A.

Transitivity

B.

Tort

C.

Reassembly

D.

Procurement

Question 30

Which type of lamp emits a strong light with a bluish cast?

Options:

A.

Sodium vapor

B.

Metal halide

C.

Mercury vapor

D.

Incandescent

Question 31

Some people emerge as experts who then sell their expertise for a fee; these people are commonly referred to as:

Options:

A.

Respondents

B.

Consultants

C.

Directors

D.

Professionals

Question 32

The power supply to a typical security system should be loaded no greater than what percentage of the total capacity to allow further expansion?

Options:

A.

55%

B.

60%

C.

75%

D.

90%

Question 33

Electromechanical and electromagnetic locks are considered fail-safe if they:

Options:

A.

Can be deactivated remotely by the fire alarm system

B.

Remain locked when the power is removed

C.

Remain unlocked when the power is removed

D.

Resist tampering

Question 34

Which of the following is true of proximity badges?

Options:

A.

They contain a series of parallel, embedded wires

B.

They can be scanned without being physically placed into a reader device

C.

They have personal data-encoded information embedded in the card

D.

They are read by an optical sensor that transmits information to a decoding unit

Question 35

What generally means removing the risk to the company by paying for the protection of an insurance policy?

Options:

A.

Security

B.

Risk transfer

C.

Collateral

D.

Self-assurance

Question 36

The purpose of methodical examination is to:

Options:

A.

Find deviations from established security standards and practices

B.

Find loopholes in security controls

C.

consider means of improving the efficiency or control of the operation without reducing security

D.

All of the above

Question 37

The ongoing task of security management is to identify potential areas of loss and to develop and install appropriate security countermeasures, this process is called ______________.

Options:

A.

Risk management

B.

Risk Analysis

C.

Security Reimbursement

D.

Business Evaluation

Question 38

Which of the following conditions affects the sensitivity of a capacitance proximity sensor?

Options:

A.

Changes in relative humidity

B.

Changes in relative temperature

C.

Rapid movement of air through the electromagnetic field

D.

End of line resistance

Question 39

Criteria for intrusion sensor performance is typically measured by which of the following?

Options:

A.

Alarm rate probability, nuisance alarm rate, and vulnerability to defeat

B.

Probability to detect, nuisance alarm rate, and vulnerability assessment

C.

Alarm rate probability, annunciation rate, and vulnerability to defeat

D.

Probability to detect, nuisance alarm rate, and vulnerability to defeat

Question 40

_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.

Options:

A.

Program Valuation

B.

Risk analysis

C.

Security survey

D.

Performance audit

Question 41

___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.

Options:

A.

Potential

B.

Capability

C.

Honesty

D.

Aptitude

Question 42

Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.

Options:

A.

True

B.

False

Question 43

Which lamp type enhances CCTV systems by imitating natural daylight conditions, but is also the most expensive light to install and maintain?

Options:

A.

Mercury vapor

B.

High-pressure sodium

C.

Metal halide

D.

Low-pressure sodium

Question 44

What are wide-beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier?

Options:

A.

Floodlights

B.

Search lights

C.

Perimeter lighting

D.

Fresnel Lenses

Question 45

A change key is normally used to

Options:

A.

minimize distribution of keys.

B.

open a single lock within a keyed system.

C.

open several locks within a keyed system.

D.

insert a new core into a lock.

Question 46

Under the principle of agency law, such an assignment transfers the liability for the service from the corporation to the independent contractor with obligations that some cannot be entirely transferred, is called:

Options:

A.

Non-delegable duty

B.

Delegable duty

C.

Non-Crime duty

D.

None of the above

Question 47

Ideally a business should have four sets of backup files;

Options:

A.

with one set of files staying on-site and three sets of files being stored off-site

B.

with two of files staying on-site and two sets of files being stored off-site

C.

with three set of files staying on-site and one set of files being stored off-site

D.

with four set of files staying on-site and no set of files being stored off-site

Question 48

Which operational test determines parameters such as nuisance alarm rates?

Options:

A.

Safety test

B.

Evaluation test

C.

Performance test

D.

Post-maintenance test

Question 49

Which of the following techniques would be used to make an unauthorized key for a lock?

Options:

A.

Impressioning

B.

Rapping

C.

Bumping

D.

Decoding

Question 50

In recommending deadbolt locks, the minimum throw of the deadbolt to provide adequate protection against jamb spreading is

Options:

A.

1/2 inch 1.3 centimeters

B.

5/8 inch 1.6 centimeters

C.

3/4 inch 1.9 centimeters

D.

1 inch 2.5 centimeters

Question 51

Which of the following is NOT the advantage of contract services?

Options:

A.

Control

B.

Administration

C.

Staffing

D.

Expertise

Question 52

How does the tangibility of an asset impact a risk assessment?

Options:

A.

Tangible assets are valued higher than intangible assets because they have a physical presence.

B.

Tangible and intangible assets require the same mitigation strategies because they both have value.

C.

Intangible assets are valued higher than tangible assets because of the potential impact to reputation.

D.

Intangible and tangible assets should be evaluated according to their individual values and protected accordingly.

Question 53

Which law concerns the rights, duties, and penalties of individuals in their relationship with each other?

Options:

A.

Procedural law

B.

Statutes suit

C.

Substantive law

D.

Constructive law

Question 54

_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.

Options:

A.

Physical security

B.

Network Security Policy

C.

Forensic investigations

D.

Spam filtering

Question 55

The demographics of an ongoing police and security force at the ___________________ create opportunities for advancement.

Options:

A.

Company Level

B.

Personal level

C.

Management level

D.

Advance level

Question 56

Who developed Ethernet?

Options:

A.

Xeror Corporation

B.

IBM

C.

Microsoft

D.

None of the above

Question 57

What occurs when the person who committed the act was able to foresee that the action would result in certain damages?

Options:

A.

Active resister

B.

Lack of control

C.

International tort

D.

None of the above

Question 58

Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:

Options:

A.

Random memory

B.

Scavenging memory

C.

Awaiting memory

D.

Search memory

Question 59

The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:

Options:

A.

Business continuity

B.

Business recovery

C.

Business resumption

D.

Business healing

Question 60

Which of the following is an example of a tangible asset?

Options:

A.

Humans

B.

Information

C.

Reputation

D.

Trademarks

Question 61

Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.

Options:

A.

business continuity, business recovery

B.

business recovery, business resumption

C.

business recovery, business continuity

D.

business continuity, business resources

Question 62

Which of the following is an example of an intangible asset?

Options:

A.

Land

B.

Buildings

C.

Natural resources

D.

Intellectual property

Question 63

Which of the following processes should be implemented in addition to a risk assessment when considering how a potentially disruptive event can negatively affect a facility ' s security program?

Options:

A.

Adversary Route

B.

After Action Report

C.

Critical Event Review

D.

Business Impact Analysis

Question 64

What involves a discreet investigation into the past and present activities of the applicant?

Options:

A.

Back-grounding

B.

Reporting

C.

Supervisory

D.

Recording

Question 65

The prediction of internal crime relies most heavily on analysis of:

Options:

A.

Employee background checks

B.

Critical area surveillance

C.

Employee surveys

D.

Historical data

Question 66

Taking personal property in such a way that the plaintiff’s use or right of possession of chattel is restricted is called:

Options:

A.

Restriction

B.

Transfer

C.

Constraint

D.

Conversion

Question 67

Nuisance alarm rate is calculated by knowing which of the following?

Options:

A.

Reviewing the sensor applications of the nuisance alarm

B.

The response times for each nuisance alarm divided by a given time period

C.

The ratio of nuisance alarms to real alarms

D.

The number of nuisance alarms received over a given time period

Question 68

Which sensor is commonly used on doors and/or windows?

Options:

A.

Capacitance

B.

Electromechanical

C.

Infrasonic

D.

Fiber optic

Question 69

Major outputs of the security system planning phase include definition of stakeholders, which of the following?

Options:

A.

Requirements documents, meeting schedules, and cost estimates

B.

Asset lists, organization charts, and facility-specific threats

C.

Vulnerability studies, adversary sequence diagrams, and defenseindepth

D.

Protective force efficiency, assessment or surveillance, and facility-specific threats

Question 70

The process of pre-qualifying vendors before issuing the request for proposal (RFP) helps to ensure that:

Options:

A.

All applicable codes are enforced

B.

Only credible and competent vendors bid on the project

C.

Only financially secure vendors bid on the project

D.

All specifications of the project are met

Question 71

What is a feeling of responsibility and respect that develops during an individual’s formative years and is subconscious?

Options:

A.

Moral honesty

B.

Trustworthiness

C.

Integrity

D.

Candor

Question 72

What not only reflect an applicant’s financial situation and stability, they also provide other useful solution such as past addresses and previous employers?

Options:

A.

Legal reports

B.

Credit reports

C.

Status reports

D.

Miscellaneous reports

Question 73

Under 50/50 rule of comparative negligence, the plaintiff can collect for damages if he or she was responsible for more or less than 50 percentage of the negligence.

Options:

A.

True

B.

False

Question 74

What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?

Options:

A.

Strict liability

B.

Plaintiff

C.

Defendant

D.

None of the above

Question 75

What considers all aspects of the security operation on a continuing basis?

Options:

A.

Security Vulnerability

B.

Data-security Act

C.

Inspection criterion

D.

Operational Audit

Question 76

Video surveillance camera selection should be based primarily on the:

Options:

A.

Horizontal resolution of the camera

B.

Number of pixels generated by the chip

C.

Sensitivity required for a full video-output signal

D.

Focal length

Question 77

After completing a thorough risk analysis, company personnel decide to manage risks by removing them from the company and paying for protection by purchasing an insurance policy. This form of risk management is known as risk:

Options:

A.

Avoidance

B.

Transfer

C.

Reduction

D.

Spreading

Question 78

For preventive maintenance to be effective, each piece of equipment to be maintained must have documentation that includes:

Options:

A.

The mean time between failures (MTBF)

B.

System performance reports

C.

Component failure rates

D.

Manufacturer specifications

Question 79

When developing a maintenance plan and the associated service levels, a system owner should place the greatest emphasis for support on equipment that:

Options:

A.

Has been in service for the longest time

B.

Would have the greatest impact on the overall system should it fail

C.

Would take the longest time to fix should it fail

D.

Requires preventative maintenance to function properly

Question 80

__________ is internationally causing fear of imminent harmful or offensive touching but without touching or physical contact.

Options:

A.

Assault

B.

Stabbing

C.

Battering

D.

None of the above

Question 81

A change review board generally consists of:

Options:

A.

A project manager, an architect, and contractors

B.

Representatives from each of the project ' s primary partners

C.

A program manager, a customer representative, and local officials

D.

Representatives from manufacturers and subcontractors

Question 82

Which of the following risk mitigation options has no cost?

Options:

A.

Risk avoidance

B.

Risk acceptance

C.

Risk limitation

D.

Risk transference

Question 83

What is the result of a jurisdiction either using common law, which was adopted from English traditions, or passing specific legislation called statutory law?

Options:

A.

Criminal law

B.

Offended suit

C.

Case law

D.

Constitution law

Question 84

In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.

Options:

A.

True

B.

False

Question 85

A device that sends a signal about whatever is sensed to some other location is called:

Options:

A.

Signal device

B.

Circuit device

C.

Wave device

D.

Line device

Question 86

The dollar loss is not simply the cost of the item lost but also includes:

Options:

A.

Temporary replacement

B.

Downtime

C.

Discounted cash

D.

All of the above

Question 87

Which of the following should take precedence when identifying countermeasures?

Options:

A.

Cost

B.

Probability

C.

Criticality

D.

Overall risk

Question 88

What is a means of making sure that a supervisor or other employees go through a prescribed series of inspections that will ascertain that functions or procedures for which they are responsible are being properly executed?

Options:

A.

Internal Audit

B.

Programmed Supervision

C.

Supervisory Inspection

D.

Security survey

Question 89

Private security functions are not essentially client orientated; public law enforcement functions are society or community oriented.

Options:

A.

True

B.

False

Question 90

Private sector will become increasingly involve in crime prevention; public law enforcement will then be free to concentrate more heavily on violent crimes and crime response.

Options:

A.

True

B.

False

Question 91

Coverage of what provides remuneration for losses due to employee dishonesty?

Options:

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Insurance against loss of use

Question 92

A company has selected a project manager to upgrade security at its manufacturing plants. A risk assessment for each plant has been completed. Which of the following is the first action of the project manager?

Options:

A.

Solicit a request for information

B.

Develop a concept design to solicit support from senior management

C.

Have construction documents prepared and sent to prospective contractors for bids

D.

Develop a phased implementation plan

Question 93

Businesses have been forced to come to terms with potential consequences of taking security risks and the solution which should be complementary is:

Options:

A.

Investment in loss prevention techniques

B.

Insurance

C.

Both A and B

D.

Neither A nor B

Question 94

WANs also allow multiple computers to share the same communication line, as is possible with LANs.

Options:

A.

True

B.

False

Question 95

The decomposition of solids to the point where they give off enough flammable vapors and gases to form an ignitable mixture is called:

Options:

A.

Liquidity

B.

Vaporization

C.

Pyrolysis

D.

None of the above

Question 96

Contingency planning is the result of which four major components?

Options:

A.

emergency response, crisis management, pressure devices, risk analysis

B.

emergency response, crisis management, business recovery, business resumption

C.

basic planning, crisis management, business recovery, business resumption

D.

under investigation, crisis management, business recovery, pressure devices

Question 97

Which of the following error-rate combinations with a biometric entry control device provides the highest level of security?

Options:

A.

Low false acceptance and low false rejection

B.

Low false acceptance and high false rejection

C.

High false acceptance and high false rejection

D.

High false acceptance and low false rejection

Question 98

The operating environment of Enterprise Security Risk Management (ESRM) includes the:

Options:

A.

Legal environment

B.

Digital environment

C.

Physical environment

D.

Geo-political environment

Question 99

Which of the following is not one of the five criteria of good security reporting?

Options:

A.

Clarity

B.

Timeliness

C.

Subjectivity

D.

Conciseness

Question 100

Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.

Options:

A.

Asset standard Act

B.

Material Safety Data Sheet

C.

Procurement Asset Safety Program

D.

Product stability program

Question 101

Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:

Options:

A.

Unrecognized holds

B.

Hold-on liabilities

C.

Hold harmless clauses

D.

None of the above

Question 102

A set of unwanted instructions executed on a computer and resulting in a variety of effects is called:

Options:

A.

Virus

B.

Worm

C.

Bug

D.

All of the above

Question 103

A security supervisor is evaluating access to control devices for the data center. The option that provides the highest level of security is

Options:

A.

a proximity card.

B.

a computer-controlled keypad.

C.

a smart card.

D.

retinal pattern recognition.

Question 104

Which of the following is the BEST method of implementing risk management?

Options:

A.

Making the most efficient after-the-loss arrangement

B.

Investing solely in loss-prevention techniques

C.

Following calculated-risk theory

D.

Making an efficient before-the-loss arrangement

Question 105

The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.

Options:

A.

True

B.

False

Question 106

Which of the following is the type of sensor used to protect metal containers by sensing entry into the magnetic field that it creates around them?

Options:

A.

Photoelectric

B.

Capacitance

C.

Sonic

D.

Ultrasonic

Question 107

Successful security design recognizes technological developments and integrates:

Options:

A.

Adversary sequence diagrams, system specifications, and work breakdown structure

B.

Threats, operational factors, and likelihood of occurrence

C.

Operational factors, organizational needs, and the human element

D.

Architectural aspects, security systems, and operational factors

Question 108

The type of electric locking device that permits free mechanical egress from the protected side of the door is the:

Options:

A.

Vertical pin

B.

Electromagnetic

C.

Electric strike

D.

Delayed egress

Question 109

Which of the following is a key factor to be considered when evaluating whether a particular facility is at risk for a bombing?

Options:

A.

Is the building located in a densely populated, urban area?

B.

Are any nearby buildings a likely target of attack?

C.

Does the building have a high occupancy rate?

D.

Are the building tenants in both domestic and international businesses?

Question 110

To ensure consistent bid submissions, a walk-through of affected buildings and locations should be conducted at the:

Options:

A.

Engineering evaluation

B.

Pre-bid conference

C.

Invitation for bid

D.

Procurement meeting

Question 111

Which one of the following options should be considered with respect to the issuance of weapons?

Options:

A.

Public perception

B.

Record of shift absences

C.

Physical fitness of the security officer

D.

Conditions when equipment may be utilized

Question 112

What is a significant issue in the operation of intrusion detection systems?

Options:

A.

Fail safe and fail secure

B.

False positives and false negatives

C.

Management knowledge of how it works

D.

Over-reliance on manual surveillance

Page: 1 / 28
Total 375 questions