Labour Day Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > AACE International > Professional Level > PSP

PSP Physical Security Professional Exam Question and Answers

Question # 4

The three keys to a successful contact are:

A.

accessibility, reviews and resource management

B.

accessibility, meetings and performance

C.

accessibility, meetings and resource management

D.

measurement, meetings and resource management

Full Access
Question # 5

The bus transportation system, represented by the American Bus Association has established an American Action Plan designed to improve safety and safety for bus operations. The goals of this plan are all of the following EXCEPT:

A.

To promote security vigilance among operators through training and partnership with law enforcement agencies

B.

To assist companies in developing infrastructures

C.

To preserve the bus industry as a strategic transportation reserve

D.

To protect the transportation infrastructure

Full Access
Question # 6

Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?

A.

Transmission Control protocol

B.

File Transfer protocol

C.

Information Control protocol

D.

None of the above

Full Access
Question # 7

Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.

A.

business continuity, business recovery

B.

business recovery, business resumption

C.

business recovery, business continuity

D.

business continuity, business resources

Full Access
Question # 8

The common practices in recruiting a jihadist are:

A.

identifying individuals with appropriate ideology

B.

indoctrination

C.

training and preparation for the terrorist act

D.

All of the above

Full Access
Question # 9

____________ builds on confusion when two or more people take advantage of their positions and the confusion to steal.

A.

Conspiracy

B.

Accountability

C.

Invoicing

D.

Proliferation

Full Access
Question # 10

Which of the following are the four types of lock-down systems?

A.

locks, plates, cables and alarms

B.

cages, plates, bolts and alarms

C.

cages, plates, cables and alarms

D.

cages, padlock, cables and alarms

Full Access
Question # 11

When using ____________, computers must ensure that there is no traffic on the network before they are allowed to transmit information.

A.

File Transfer protocol

B.

Buses

C.

Ethernet protocol

D.

None of the above

Full Access
Question # 12

Which of the following is NOT the distinct action that fall into invasion of privacy?

A.

misappropriation of the plaintiff’s name or picture for commercial advantage

B.

placing the plaintiff in the false light

C.

private disclosure of public facts

D.

intrusion into the seclusion of another

Full Access
Question # 13

What refers to the number of employees over which any individual can exercise direct supervision effectively?

A.

Corporate period

B.

Delegate control

C.

Span of control

D.

None of the above

Full Access
Question # 14

The recommendations of the Task Force on private security include which one of the following?

A.

a minimum of eight hours of formal pre-assignment training

B.

basic training of a maximum of 32 hours within 2 months of assignment, of which minimum of 16 hours can be supervised on-the-job training.

C.

Both A & B

D.

Neither A nor B

Full Access
Question # 15

The purpose of methodical examination is to:

A.

Find deviations from established security standards and practices

B.

Find loopholes in security controls

C.

consider means of improving the efficiency or control of the operation without reducing security

D.

All of the above

Full Access
Question # 16

An event that is possible but uncertain in terms of occurrence or that is likely to happen as an adjunct to other events is called:

A.

Contingent

B.

Critical processes

C.

Conditional delegation

D.

Emergency response

Full Access
Question # 17

IP sends information across networks in packets, each containing between 1 and approximately:

A.

1,000 characters

B.

12, 00 characters

C.

15, 00 characters

D.

18, 00 characters

Full Access
Question # 18

A solicitation by police officers is another charge that may be leveled against security officers is called:

A.

Criminal liability

B.

Wrongful death

C.

Verdict Act

D.

Entrapment

Full Access
Question # 19

Which of the following is NOT the organizational level of international terrorism?

A.

Individual terrorism

B.

Modern terrorism

C.

Group terrorism

D.

State terrorism

Full Access
Question # 20

What involves a discreet investigation into the past and present activities of the applicant?

A.

Back-grounding

B.

Reporting

C.

Supervisory

D.

Recording

Full Access
Question # 21

Removing the problem by eliminating the risk is known as:

A.

Risk avoidance

B.

Risk prevention

C.

Risk reduction

D.

Risk elimination

Full Access
Question # 22

Private sector will become increasingly involve in crime prevention; public law enforcement will then be free to concentrate more heavily on violent crimes and crime response.

A.

True

B.

False

Full Access
Question # 23

Document the events, circumstances, and chronology and prepare a “lesson learned” review are the primary parts of:

A.

Testing

B.

Quality assurance

C.

After action

D.

All of the above

Full Access
Question # 24

When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:

A.

Innocuous Bug

B.

Catastrophic Virus

C.

Hostile worm

D.

Trojan Horse

Full Access
Question # 25

A concept that has grown largely in response to the difficulties faced by merchants in protecting their property from shoplifters and the problems and dangers they face when they make an asset, is called:

A.

Release

B.

Confinement

C.

Detention

D.

None of the above

Full Access
Question # 26

The decomposition of solids to the point where they give off enough flammable vapors and gases to form an ignitable mixture is called:

A.

Liquidity

B.

Vaporization

C.

Pyrolysis

D.

None of the above

Full Access
Question # 27

A study of BDP international has found that ___________ of shippers are factoring in additional time to comply with the Advanced Manifest System, which went into effect in February 2003. This Department of Homeland security rule requires the filing of complete import manifest documentation at least 24 hours before U.S.-bound ships are loaded at foreign ports.

A.

30 percent

B.

25 perc

C.

35 percent

D.

40 percent

Full Access
Question # 28

Under 50/50 rule of comparative negligence, the plaintiff can collect for damages if he or she was responsible for more or less than 50 percentage of the negligence.

A.

True

B.

False

Full Access
Question # 29

The demographics of an ongoing police and security force at the ___________________ create opportunities for advancement.

A.

Company Level

B.

Personal level

C.

Management level

D.

Advance level

Full Access
Question # 30

WANs used which protocol developed by the Consultative Committee for International Telephone and Telegraph.

A.

X.25

B.

XA.10

C.

CXA 1.23

D.

X.20

Full Access
Question # 31

LANs and WANs can communicate with each other using a communications rule called:

A.

Ethernet Protocol packet

B.

Protocol Assembly packet

C.

XOP.210 Protocol packet

D.

Internet Protocol packet

Full Access
Question # 32

Coverage of what provides remuneration for losses due to employee dishonesty?

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Insurance against loss of use

Full Access
Question # 33

The operations that are ‘in-house’, or controlled entirely by the company establishing security for its operations is called:

A.

Contract security operations

B.

Proprietary security operations

C.

Staffing operations

D.

Control operations

Full Access
Question # 34

A good hybrid security operation consists of which component?

A.

engaged corporate liaison

B.

consistent contract management support

C.

accurate quality measurements

D.

All of the above

Full Access
Question # 35

The process of finding the person best qualified for the job in terms of both skills and personal integrity is known as:

A.

Inspection

B.

Recruitment

C.

Vetting

D.

Screening

Full Access
Question # 36

Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.

A.

Asset standard Act

B.

Material Safety Data Sheet

C.

Procurement Asset Safety Program

D.

Product stability program

Full Access
Question # 37

The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:

A.

Analysis

B.

Integrity

C.

Security

D.

Availability

Full Access
Question # 38

What allows people to log on to a remote computer and use the resources of that system if they have a valid account?

A.

Cabinet

B.

Telnet

C.

Telecom

D.

None of the above

Full Access
Question # 39

What occurs when the person who committed the act was able to foresee that the action would result in certain damages?

A.

Active resister

B.

Lack of control

C.

International tort

D.

None of the above

Full Access
Question # 40

What is an operational method in which the very act of the attack is dependent upon the death of the perpetrator?

A.

Time bomb attack

B.

Terrorist attack

C.

Suicide attack

Full Access
Question # 41

From a management point of view, organizing the security effort involves:

A.

Planning & goal setting

B.

Establishing controls

C.

Hiring personnel

D.

All of the above

Full Access
Question # 42

When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:

A.

Financial authority

B.

Control authority

C.

Staff authority

D.

Dominance authority

Full Access
Question # 43

___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.

A.

Potential

B.

Capability

C.

Honesty

D.

Aptitude

Full Access
Question # 44

The process of planning for response, recovery, and resumption activities for the infrastructure, critical processes and other elements is known as:

A.

Contingent planning

B.

Continuity planning

C.

Resource planning

D.

Resumption planning

Full Access
Question # 45

What generally means removing the risk to the company by paying for the protection of an insurance policy?

A.

Security

B.

Risk transfer

C.

Collateral

D.

Self-assurance

Full Access
Question # 46

Which of the following is NOT included in the pass systems?

A.

Single pass system

B.

Multiple pass system

C.

Pass-exchange system

D.

Pass-control system

Full Access
Question # 47

Who must regularly study and analyze the channels of communication to be certain that the input they receive is accurate, relevant, timely, concise and informative?

A.

Chief Information Officer

B.

Information Security Information Officer

C.

Chief Minister

D.

Chief Security Officer

Full Access
Question # 48

____________ includes self-employed individuals and funded business entities and organizations providing security-related services to specific clientele for a fee.

A.

Public security

B.

Private security

C.

Security firm

D.

Security function

Full Access
Question # 49

In ___________, air has been reduced or fuel is dwindling to the point where there is no visible flame, just an entire area filled with tremendous heat.

A.

Smoldering burning

B.

Ignition stage

C.

Last stage

D.

Incipient stage

Full Access
Question # 50

Those who are delegated authority in the direct chain of command to accomplish specific organizational objectives are known as:

A.

Management

B.

Authorized directives

C.

Line executives

D.

Stockholders

Full Access
Question # 51

What not only reflect an applicant’s financial situation and stability, they also provide other useful solution such as past addresses and previous employers?

A.

Legal reports

B.

Credit reports

C.

Status reports

D.

Miscellaneous reports

Full Access
Question # 52

Which approach is dealt with terrorists’ personalities, their recruitment, and their induction into terrorist organizations, beliefs, attitudes, motivations and careers?

A.

Multifactor Approach

B.

Physiological Approach

C.

Violence Approach

D.

Criminal approach

Full Access
Question # 53

Which of the following is NOT of the basic trends of security services?

A.

Regulate training and standards

B.

Attract better qualified individuals

C.

Disarm security personnel

D.

All of the above

Full Access
Question # 54

_______________ of risk involves planning for an eventual loss without benefit of insurance.

A.

Planning

B.

Transfer

C.

locking

D.

Self-assumption

Full Access