Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > ASIS > Physical Security Professional > ASIS-PSP

ASIS-PSP Physical Security Professional (PSP) Exam Question and Answers

Question # 4

A system in which a badge or pass coded for authorization to enter specific areas is issued to an employee, who keeps it until the authorization id changed or until he or she leaves the company is called:

A.

Single pass system

B.

Contractive pass system

C.

Pass-exchange system

D.

None of the above

Full Access
Question # 5

In which ingredients are added to the loss prevention function one by one as the need arises, without a comprehensive plan, is called:

A.

Piecemeal security

B.

Small relative security

C.

Detached security

D.

Independent security

Full Access
Question # 6

A voluntary and intentional violation by a legally competent parson of a legal duty that commands or prohibits an act for the protection of society is known as:

A.

Corruption

B.

Law-breaking

C.

Fault

D.

Crime

Full Access
Question # 7

Which of the following is best for reducing the number of nuisance alarms?

A.

Placing signage on the inside of doors

B.

Conducting frequent door inspections and promptly replacing faulty components

C.

Having security guards patrol after hours

D.

Examining janitorial programs and ensuring that cleaning is done only during the day

Full Access
Question # 8

The moment the fire begins, when fuel, air, and an ignition source all come together at the right rate for the correct period of time id called:

A.

Free burning

B.

Ignition stage

C.

Pyrolysis stage

D.

Incipient stage

Full Access
Question # 9

A device that is designed to respond to a certain change in conditions, such as the opening of a door, movement within a room or rapid rise in heat is known as:

A.

Sounding device

B.

Enunciator

C.

Sending device

D.

Alarm sensor

Full Access
Question # 10

Which of the following should take precedence when identifying countermeasures?

A.

Cost

B.

Probability

C.

Criticality

D.

Overall risk

Full Access
Question # 11

Equipment requirements, installation services, and ongoing maintenance services are all part of:

A.

Return-on-investment costs

B.

Needs analysis

C.

Bid specifications

D.

Cost-benefit analysis

Full Access
Question # 12

Nuisance alarm rate is calculated by knowing which of the following?

A.

Reviewing the sensor applications of the nuisance alarm

B.

The response times for each nuisance alarm divided by a given time period

C.

The ratio of nuisance alarms to real alarms

D.

The number of nuisance alarms received over a given time period

Full Access
Question # 13

Color rendition, with respect to security lighting, can be described as the:

A.

Ability to discriminate, grade, or select colors

B.

Color temperature of a specific light source

C.

Effect of light on colored surfaces

D.

Color spectrum emitted by a lighting fixture

Full Access
Question # 14

From a management point of view, organizing the security effort involves:

A.

Planning & goal setting

B.

Establishing controls

C.

Hiring personnel

D.

All of the above

Full Access
Question # 15

The term probability of detection BEST describes the:

A.

Criteria evaluated during system validation testing

B.

Security officer response percentage

C.

Effectiveness of an electronic security system

D.

Time between initial detection and occurrence of response

Full Access
Question # 16

Which approach is dealt with terrorists’ personalities, their recruitment, and their induction into terrorist organizations, beliefs, attitudes, motivations and careers?

A.

Multifactor Approach

B.

Physiological Approach

C.

Violence Approach

D.

Criminal approach

Full Access
Question # 17

In ___________, air has been reduced or fuel is dwindling to the point where there is no visible flame, just an entire area filled with tremendous heat.

A.

Smoldering burning

B.

Ignition stage

C.

Last stage

D.

Incipient stage

Full Access
Question # 18

Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?

A.

Transmission Control protocol

B.

File Transfer protocol

C.

Information Control protocol

D.

None of the above

Full Access
Question # 19

A guiding principle of business continuity planning is that the plan:

A.

Must include remote site capability

B.

Must be flexible and adapted to meet the situation

C.

Must include full instructions from management on all contingencies

D.

Should be in outline format and established as the recovery mission unfolds

Full Access
Question # 20

Reserves are the people standing by in the event that assistance is needed by security personnel on fixed posts or patrol; duty.

A.

True

B.

False

Full Access
Question # 21

For typical CCTV surveillance, which of the following common surfaces has the lowest reflectance?

A.

A snow-covered field

B.

Dry, sandy soil

C.

Asphalt

D.

A red brick building

Full Access
Question # 22

In terms of security and safety, a high-rise structure is generally considered to be a building that:

A.

Has two or more emergency exit stairwells

B.

Is taller than the maximum reach of available firefighting equipment

C.

Is greater than 100 feet in height

D.

Is greater than twelve stories in height

Full Access
Question # 23

Which of the following error-rate combinations with a biometric entry control device provides the highest level of security?

A.

Low false acceptance and low false rejection

B.

Low false acceptance and high false rejection

C.

High false acceptance and high false rejection

D.

High false acceptance and low false rejection

Full Access
Question # 24

Which class of fire, fires and extinguishes deal with cooking oil fires?

A.

Class C

B.

Class D

C.

Class K

D.

Class L

Full Access
Question # 25

Microwave sensors should be mounted

A.

aimed at an exterior wall.

B.

at the height of an intruder in the area being protected.

C.

near the floor of the area being protected.

D.

near the ceiling of the area being protected.

Full Access
Question # 26

__________ is a plant, building, office, institution, or any commercial or industrial structure or complex with all the attendant structures and functions that are part of an integrated operation.

A.

Facility

B.

Contents

C.

Interior

D.

Padlocks

Full Access
Question # 27

Which of the following is an example of a tangible asset?

A.

Humans

B.

Information

C.

Reputation

D.

Trademarks

Full Access
Question # 28

Worms take over computer memory and deny its use to legitimate programs.

A.

True

B.

False

Full Access
Question # 29

Microwave sensors work best on targets moving through the detection zone:

A.

Laterally in relation to the sensor

B.

At high speed

C.

Toward or away from the sensor

D.

At low speed

Full Access
Question # 30

The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.

A.

True

B.

False

Full Access
Question # 31

To protect against interruption of critical telecommunications systems, security professionals should recommend:

A.

Cable access points be under either direct observation or within CCTV camera view at all times

B.

Wireless communication in lieu of cable

C.

Tamper-proof fiber optic cables should be used

D.

Two physically separated paths for telecommunications cable entering the facility

Full Access
Question # 32

All projects have which of the following four stages?

A.

Feasibility, development, examination, and closeout

B.

Feasibility, development, execution, and completion

C.

Feasibility, design, execution, and closeout

D.

Feasibility, development, execution, and closeout

Full Access
Question # 33

What can be used as servers and do not require special installation?

A.

Workstations

B.

Minicomputers

C.

Supercomputers

D.

None of the above

Full Access
Question # 34

Which terrorism requires organization and some type of leadership, recruitment, training, and retention of members?

A.

Individual terrorism

B.

Modern terrorism

C.

Group terrorism

D.

State terrorism

Full Access
Question # 35

What is the distance limitation for category-rated unshielded twisted pair (UTP) cable?

A.

100 ft. (31 m)

B.

238 ft. (73 m)

C.

328 ft. (100 m)

D.

492 ft. (150 m)

Full Access
Question # 36

The sites that are partially configured but are missing the central computer are called:

A.

Hot sites

B.

Warm sites

C.

Cold sites

D.

Frequent sites

Full Access
Question # 37

Insurance can be a substitute for a security program.

A.

True

B.

False

Full Access
Question # 38

Which alarm warn of a process reaching a dangerous temperature, of the presence of toxic fumes, or that a machine is running too fast?

A.

Burglar alarm

B.

Special-use alarm

C.

Intrusion alarms

D.

Protection alarm

Full Access
Question # 39

When a bomb threat is received and identifies a specific floor as containing the bomb, the initial building evacuation should focus on the affected floor and:

A.

The immediate area

B.

The floors immediately above and below

C.

All floors above

D.

All floors below

Full Access
Question # 40

The system which provides an extra measure of security by requiring that exchanges take place at the entrance to each restricted area within the controlled area is called:

A.

Single pass system

B.

Contractive pass system

C.

Pass-exchange system

D.

Multiple-pass system

Full Access
Question # 41

What must be accomplished to accurately determine the financial and operational impact that could result from an interruption of enterprise operations?

A.

Enterprise impact analysis

B.

Managerial impact analysis

C.

Critical process impact

D.

Business impact analysis

Full Access
Question # 42

If a camera is mounted 40 feet (12 meters) above the ground on the outside wall of a building and is focused on an entry gate that is 30 feet (9 meters) from the building, what is the focal length of this application?

A.

30 feet (9 meters)

B.

40 feet (12 meters)

C.

50 feet (15 meters)

D.

60 feet (18 meters)

Full Access
Question # 43

A change key is normally used to

A.

minimize distribution of keys.

B.

open a single lock within a keyed system.

C.

open several locks within a keyed system.

D.

insert a new core into a lock.

Full Access
Question # 44

An example of preventive maintenance for a physical protection system PPS includes

A.

investigating the system problem.

B.

updating system and application software.

C.

restoring the system or returning its use to the customer.

D.

updating system documentation with respect to the problem and its resolution.

Full Access
Question # 45

Which of the following types of procurement is most frequently used when a customer has intimate knowledge of the requirements defined and the systems available in the market?

A.

Invitation to bid

B.

Request for proposals

C.

Sole source

D.

Request for quote

Full Access
Question # 46

Which of the following risk mitigation options has no cost?

A.

Risk avoidance

B.

Risk acceptance

C.

Risk limitation

D.

Risk transference

Full Access
Question # 47

When preparing a pre-bid conference and ensuring the process is competitive, it is important to select a team representative responsible for the meeting minutes and to record

A.

the contractors and personnel who attended the conference.

B.

the contractors that completed a walk-through of the location.

C.

the physical conditions and affected buildings and locations.

D.

the project questions and answers given during the conference.

Full Access
Question # 48

If emergency exit stairwells in a high-rise building are used by tenants for convenient travel between floors, and it is permitted by local jurisdiction, the stairwell doors should be:

A.

Equipped with fail secure electric mag locks

B.

Unlocked during building occupancy (business hours)

C.

Unlocked on every fourth level except for roof access

D.

Equipped with approved access control devices and two-way intercoms

Full Access
Question # 49

Critical process recovery requires an assessment of resources.

A.

True

B.

False

Full Access
Question # 50

The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?

A.

International terrorism

B.

Modern terrorism

C.

Modern Revolutionary

D.

Modern War weapons

Full Access
Question # 51

Testing designed to determine whether a system is functional, has adequate sensitivity, and meets design and performance objectives accurately describes which of the following?

A.

Factory acceptance testing

B.

Reliability performance testing

C.

Equipment performance testing

D.

Site acceptance testing

Full Access
Question # 52

In a physical protection system (PPS), a 4:1 light-to-dark ratio is the preferred design goal to allow for

A.

high surface reflection.

B.

high aspect ratio.

C.

environmental and degradation factors.

D.

reflected glare reduction.

Full Access
Question # 53

While conducting a security survey, the surveyor would need to reference which of the following drawings in order to determine the location of all security devices?

A.

Elevation drawings

B.

Details drawings

C.

Riser diagrams

D.

Plan drawings

Full Access
Question # 54

Which one of the following options should be included in post orders?

A.

Review shift log with relieving officer

B.

Express the policies of the protected enterprise

C.

Verbal instructions override the written instructions

D.

Express the policies of the local authority having jurisdiction

Full Access
Question # 55

_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.

A.

Program Valuation

B.

Risk analysis

C.

Security survey

D.

Performance audit

Full Access
Question # 56

What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?

A.

Strict liability

B.

Plaintiff

C.

Defendant

D.

None of the above

Full Access
Question # 57

The measures of effectiveness of entry control include throughput, false acceptance rate, and:

A.

Cost

B.

Activation delays

C.

False rejection rate

D.

System obsolescence

Full Access
Question # 58

The determination of Physical Protection System (PPS) objectives begins with:

A.

Documenting an iterative risk and risk mitigation analysis

B.

Evaluating the budget

C.

Developing a thorough description of the facility and processes

D.

Composing a business case for senior management approval

Full Access
Question # 59

To identify and classify risk, it is necessary to examine all activities and relationships of a facility and develop answers to which of the following three basic considerations?

A.

Assets, exposure, and losses

B.

Losses, assets, and countermeasures

C.

Countermeasures, exposure, and assets

D.

Resources, assets, and countermeasures

Full Access
Question # 60

Which of the following is a principle of crime prevention through environmental design (CPTED)?

A.

Balanced systems

B.

Protection in depth

C.

Natural surveillance

D.

Layered defense

Full Access
Question # 61

Improved staff motivation from training leads to increased

A.

workload.

B.

supervision.

C.

legal protection.

D.

employee morale.

Full Access
Question # 62

The introduction of holography into badge control systems reduces the chance of:

A.

Theft

B.

Counterfeiting

C.

Intrusion

D.

Security

Full Access
Question # 63

What signal the entry of persons into a facility or an area while the system is in operation?

A.

Invasions

B.

Access door

C.

Intrusion alarms

D.

Protection alarms

Full Access
Question # 64

A person who already knows and understands the basics of loss prevention and security is known as:

A.

Engaged liaison

B.

Review personnel

C.

Supportive person

D.

None of the above

Full Access
Question # 65

Which of the following is the most widely accepted classification of skills for the leadership?

A.

Skill Mix

B.

Conceptual

C.

Human relations

D.

All of the above

Full Access
Question # 66

____________ includes self-employed individuals and funded business entities and organizations providing security-related services to specific clientele for a fee.

A.

Public security

B.

Private security

C.

Security firm

D.

Security function

Full Access
Question # 67

What results from fearing the consequences of being caught; and is a product of reasoning?

A.

Speech honesty

B.

Conditional honesty

C.

Integrity

D.

Conduct

Full Access
Question # 68

What scrambles the information so that it is not usable unless the changes are reversed?

A.

Distraction

B.

Disgruntling

C.

Falsification

D.

Encryption

Full Access
Question # 69

Who developed Ethernet?

A.

Xeror Corporation

B.

IBM

C.

Microsoft

D.

None of the above

Full Access
Question # 70

The decomposition of solids to the point where they give off enough flammable vapors and gases to form an ignitable mixture is called:

A.

Liquidity

B.

Vaporization

C.

Pyrolysis

D.

None of the above

Full Access
Question # 71

Which of the following is NOT the advantage of proprietary officers?

A.

Quality of personnel

B.

Loyalty

C.

Impartiality

D.

Prestige

Full Access
Question # 72

Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.

A.

Asset standard Act

B.

Material Safety Data Sheet

C.

Procurement Asset Safety Program

D.

Product stability program

Full Access
Question # 73

Which type of lamp emits a strong light with a bluish cast?

A.

Sodium vapor

B.

Metal halide

C.

Mercury vapor

D.

Incandescent

Full Access
Question # 74

Which of the following is the category of integrity and lie detection tests?

A.

Polygraph

B.

Psychological Stress Evaluator

C.

Personal Security Inventory

D.

All of the above

Full Access
Question # 75

___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.

A.

Potential

B.

Capability

C.

Honesty

D.

Aptitude

Full Access
Question # 76

A threat source differentiates the potential of one facility to be attacked versus another in a different location. This activity is referred to as:

A.

Targeting

B.

Motivation

C.

Collusion

D.

Desire

Full Access
Question # 77

A series of menus from which a person can access virtually any type of textual information is known as:

A.

Consortium

B.

Hyper-text based tool

C.

Symantec

D.

Gophers

Full Access
Question # 78

Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.

A.

True

B.

False

Full Access
Question # 79

The classic triangle frequently referred to in describing the nature of fire consists of:

A.

heat, fuel, oxygen

B.

heat, light, oxygen

C.

heat, smoke, oxygen

D.

heat, carbon dioxide, oxygen

Full Access
Question # 80

Which of the following types of post-implementation testing is MOST likely to involve the use of measuring devices, calibrated instruments, or special methods?

A.

Operational

B.

Performance

C.

Subsystem

D.

Post-maintenance

Full Access
Question # 81

What is a major management function in business worldwide?

A.

Security

B.

Projection

C.

Quality

D.

Mission

Full Access
Question # 82

Which sensor should a security professional select for a confined interior area that will contain explosive vapors and materials?

A.

Ultrasonic sensor

B.

Passive infrared sensor

C.

Capacitance sensor

D.

Passive vibration sensor

Full Access
Question # 83

Which of the following consumes the greatest portion of a project manager ' s time over the life of a project?

A.

Documentation

B.

Meetings

C.

Planning

D.

Control

Full Access
Question # 84

The prediction of internal crime relies most heavily on analysis of:

A.

Employee background checks

B.

Critical area surveillance

C.

Employee surveys

D.

Historical data

Full Access
Question # 85

After completing a thorough risk analysis, company personnel decide to manage risks by removing them from the company and paying for protection by purchasing an insurance policy. This form of risk management is known as risk:

A.

Avoidance

B.

Transfer

C.

Reduction

D.

Spreading

Full Access
Question # 86

As part of an initial evaluation of the significant threats or hazards to an organization, the security practitioner should:

A.

Estimate costs

B.

Estimate the likelihood of occurrence

C.

Develop a business case for additional security equipment and staff

D.

Develop a response plan

Full Access
Question # 87

As the project overseer in a major construction project, who is responsible for providing documentation for the final security system design?

A.

Security Vendor

B.

System Engineer

C.

Architect

D.

Security Consultant

Full Access
Question # 88

The three keys to a successful contact are:

A.

accessibility, reviews and resource management

B.

accessibility, meetings and performance

C.

accessibility, meetings and resource management

D.

measurement, meetings and resource management

Full Access
Question # 89

What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?

A.

Identity fraud

B.

Identity theft

C.

Identity dissemination

D.

Identity Distortion

Full Access
Question # 90

The annual loss expectancy (ALE) formula is based on:

A.

Impact and loss

B.

Risk and mitigation

C.

Frequency and risk

D.

Impact and frequency

Full Access
Question # 91

All physical barriers are designed to discourage three types of penetration. These types of penetration are:

A.

Accident, force, and stealth

B.

Force, stealth, and tools

C.

Vehicle, stealth, and force

D.

Stealth, deception, and force

Full Access
Question # 92

Observability is the ability of the adversary to

A.

report a vulnerability.

B.

cause a vulnerability.

C.

exploit a vulnerability.

D.

recognize a vulnerability.

Full Access
Question # 93

An owner ' s acceptance of a security system marks the beginning of:

A.

The warranty period

B.

Phase II assessment

C.

Phase II testing

D.

Site acceptance testing

Full Access
Question # 94

Which liability is of concern to enterprises that contract or employs security services and is an indirect legal responsibility?

A.

Strict

B.

Negligence

C.

Vicarious

D.

Loose

Full Access
Question # 95

Preliminary cost estimates are part of which stage in the project management process?

A.

Design

B.

Development

C.

Execution

D.

Feasibility

Full Access
Question # 96

In which approach of comparative negligence, the plaintiff may collect something for injuries even if he or she was primarily responsible for the injuries?

A.

Pure approach

B.

50/50 rule

C.

51 percent rule

D.

None of the above

Full Access
Question # 97

Security is a business unit and its function must:

A.

Cycle on a quarterly basis

B.

Be directed by a certified manager

C.

Support the organization ' s mission

D.

Be performed at the lowest cost

Full Access
Question # 98

What considers all aspects of the security operation on a continuing basis?

A.

Security Vulnerability

B.

Data-security Act

C.

Inspection criterion

D.

Operational Audit

Full Access
Question # 99

Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.

A.

True

B.

False

Full Access
Question # 100

The balanced magnetic switch differs from the simple magnetic switch in that it:

A.

Is meant to be used on non-ferrous doors such as aluminum or wood

B.

Must be mounted at an angle

C.

Must be used in pairs

D.

Is harder to defeat

Full Access
Question # 101

What is the primary function of the communications subsystem in a security setup for all security subsystems?

A.

To provide connectivity

B.

To coordinate surveillance operations

C.

To facilitate emergency communications

D.

To enable secure data transmission between devices

Full Access
Question # 102

The recommendations of the Task Force on private security include which one of the following?

A.

a minimum of eight hours of formal pre-assignment training

B.

basic training of a maximum of 32 hours within 2 months of assignment, of which minimum of 16 hours can be supervised on-the-job training.

C.

Both A & B

D.

Neither A nor B

Full Access
Question # 103

Which of eth following is NOT the type of insurance?

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Privacy Invasion

Full Access
Question # 104

The planning phase of a physical protection system implementation produces which two of the following very important work products?

A.

Design requirements and sole-source justification

B.

Cost and equipment list

C.

Contract information and bidder instructions

D.

Drawings and preliminary design

Full Access
Question # 105

Security services in which the security force is hired and controlled directly by the protected organization are called:

A.

Proprietary

B.

Security enforcement

C.

Pilferage

D.

Contract security services

Full Access
Question # 106

Which of the following is the type of comparative negligence statute?

A.

Pure approach

B.

50/50 rule

C.

51 percent rule

D.

All of the above

Full Access
Question # 107

A miscellaneous opening that penetrates a perimeter must be protected and able to be locked when the cross-section area is at least:

A.

76 square inches (490 square centimeters)

B.

92 square inches (594 square centimeters)

C.

96 square inches (619 square centimeters)

D.

108 square inches (697 square centimeters)

Full Access
Question # 108

Which type of training is critical to attaining a successful objective of a physical security program implemented to safeguard all employees and meet the organization ' s security objectives?

A.

Security policy

B.

Security operations

C.

Security awareness

D.

Security procedures

Full Access
Question # 109

Who must regularly study and analyze the channels of communication to be certain that the input they receive is accurate, relevant, timely, concise and informative?

A.

Chief Information Officer

B.

Information Security Information Officer

C.

Chief Minister

D.

Chief Security Officer

Full Access
Question # 110

Which of the following is an " active volumetric sensor " ?

A.

Infrared

B.

Capacitance

C.

Ultrasonic

D.

Vibration

Full Access
Question # 111

If a crime occurs on a company ' s property, the company can be considered " on notice. " A subsequent occurrence of a similar crime would then be considered:

A.

Foreseeable

B.

The result of inadequate security

C.

Legally binding

D.

A breach of duty

Full Access
Question # 112

Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.

A.

business continuity, business recovery

B.

business recovery, business resumption

C.

business recovery, business continuity

D.

business continuity, business resources

Full Access