Labour Day Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

AACE International PSP Physical Security Professional Exam Exam Practice Test

Demo: 54 questions
Total 120 questions

Physical Security Professional Exam Questions and Answers

Question 1

The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:

Options:

A.

Analysis

B.

Integrity

C.

Security

D.

Availability

Question 2

What involves walking or riding a given route to observe the condition of the facility?

Options:

A.

Patrol duty

B.

Posts

C.

Reserves

D.

None of the above

Question 3

What must be accomplished to accurately determine the financial and operational impact that could result from an interruption of enterprise operations?

Options:

A.

Enterprise impact analysis

B.

Managerial impact analysis

C.

Critical process impact

D.

Business impact analysis

Question 4

The division of several area programmed supervision results in a aggregate operational audit, and aggregate operational audit considered in aggregate are an entire company’s programmed supervision.

Options:

A.

True

B.

False

Question 5

Concerns itself with those means by which a given facility protects itself against theft and any natural disasters is called:

Options:

A.

refuge

B.

Physical security

C.

safety measures

D.

precautions

Question 6

What are used only for handling and storing high-value cargo?

Options:

A.

Limited areas

B.

Exclusion areas

C.

Multiple areas

D.

None of the above

Question 7

What is a means of making sure that a supervisor or other employees go through a prescribed series of inspections that will ascertain that functions or procedures for which they are responsible are being properly executed?

Options:

A.

Internal Audit

B.

Programmed Supervision

C.

Supervisory Inspection

D.

Security survey

Question 8

Which of the following is NOT the type of viruses?

Options:

A.

Innocuous Virus

B.

Humorous Virus

C.

Hostile Virus

D.

Altering Virus

Question 9

A good risk management program involves:

Options:

A.

Identify risks or specific vulnerabilities

B.

Analyze and study risks, including likelihood and degree of danger of an event

C.

Study of security programs

D.

All of the above

Question 10

What occurs when the person who committed the act was able to foresee that the action would result in certain damages?

Options:

A.

Active resister

B.

Lack of control

C.

International tort

D.

None of the above

Question 11

Businesses have been forced to come to terms with potential consequences of taking security risks and the solution which should be complementary is:

Options:

A.

Investment in loss prevention techniques

B.

Insurance

C.

Both A and B

D.

Neither A nor B

Question 12

What focus on legal principles and theories along with cases in which such principles predominate?

Options:

A.

Encyclopedias

B.

Legal document

C.

Formal memorandum

D.

None of the above

Question 13

Which of eth following is NOT the type of insurance?

Options:

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Privacy Invasion

Question 14

Under the principle of agency law, such an assignment transfers the liability for the service from the corporation to the independent contractor with obligations that some cannot be entirely transferred, is called:

Options:

A.

Non-delegable duty

B.

Delegable duty

C.

Non-Crime duty

D.

None of the above

Question 15

The process of finding the person best qualified for the job in terms of both skills and personal integrity is known as:

Options:

A.

Inspection

B.

Recruitment

C.

Vetting

D.

Screening

Question 16

Who must regularly study and analyze the channels of communication to be certain that the input they receive is accurate, relevant, timely, concise and informative?

Options:

A.

Chief Information Officer

B.

Information Security Information Officer

C.

Chief Minister

D.

Chief Security Officer

Question 17

Which of the following is NOT the advantage of contract services?

Options:

A.

Control

B.

Administration

C.

Staffing

D.

Expertise

Question 18

The process of planning for response, recovery, and resumption activities for the infrastructure, critical processes and other elements is known as:

Options:

A.

Contingent planning

B.

Continuity planning

C.

Resource planning

D.

Resumption planning

Question 19

Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.

Options:

A.

Asset standard Act

B.

Material Safety Data Sheet

C.

Procurement Asset Safety Program

D.

Product stability program

Question 20

In which ingredients are added to the loss prevention function one by one as the need arises, without a comprehensive plan, is called:

Options:

A.

Piecemeal security

B.

Small relative security

C.

Detached security

D.

Independent security

Question 21

When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:

Options:

A.

Financial authority

B.

Control authority

C.

Staff authority

D.

Dominance authority

Question 22

Reserves are the people standing by in the event that assistance is needed by security personnel on fixed posts or patrol; duty.

Options:

A.

True

B.

False

Question 23

Which of the following is the category of integrity and lie detection tests?

Options:

A.

Polygraph

B.

Psychological Stress Evaluator

C.

Personal Security Inventory

D.

All of the above

Question 24

The central station, local alarm system, auxiliary systems are all currently available systems of:

Options:

A.

Alarm monitoring systems

B.

Sonic Alarm systems

C.

Capacitance Alarm systems

D.

Motion detection systems

Question 25

Which department has total supervision over a firm’s money and will generally be the area most vulnerable to major loss due to crime?

Options:

A.

Accounting

B.

Data-Processing

C.

Purchasing

D.

Shipping and Receiving

Question 26

Material Safety Data Sheet (MSDS) that must be available for each chemical at the work site contains which sections?

Options:

A.

Production identification

B.

Hazardous ingredients list

C.

Physical characteristics

D.

All of the above

Question 27

__________ is internationally causing fear of imminent harmful or offensive touching but without touching or physical contact.

Options:

A.

Assault

B.

Stabbing

C.

Battering

D.

None of the above

Question 28

Some people emerge as experts who then sell their expertise for a fee; these people are commonly referred to as:

Options:

A.

Respondents

B.

Consultants

C.

Directors

D.

Professionals

Question 29

The common practices in recruiting a jihadist are:

Options:

A.

identifying individuals with appropriate ideology

B.

indoctrination

C.

training and preparation for the terrorist act

D.

All of the above

Question 30

Tapping without authorization into communication lines over which digitized computer data and messages are being sent is called:

Options:

A.

Electronic eavesdropping

B.

War driving

C.

Digital beating

D.

Standard digitizing

Question 31

What might be the resentment of an employee who feels the vengefulness of an employee who has been passed over for promotion?

Options:

A.

desire

B.

motive

C.

opportunity

D.

all of the above

Question 32

A civil action based on the principle that one individual can expect certain behavior from another individual is known as:

Options:

A.

Transitivity

B.

Tort

C.

Reassembly

D.

Procurement

Question 33

What is the result of a jurisdiction either using common law, which was adopted from English traditions, or passing specific legislation called statutory law?

Options:

A.

Criminal law

B.

Offended suit

C.

Case law

D.

Constitution law

Question 34

Which class of fire, fires and extinguishes deal with cooking oil fires?

Options:

A.

Class C

B.

Class D

C.

Class K

D.

Class L

Question 35

WANs used which protocol developed by the Consultative Committee for International Telephone and Telegraph.

Options:

A.

X.25

B.

XA.10

C.

CXA 1.23

D.

X.20

Question 36

A good hybrid security operation consists of which component?

Options:

A.

engaged corporate liaison

B.

consistent contract management support

C.

accurate quality measurements

D.

All of the above

Question 37

An event that is possible but uncertain in terms of occurrence or that is likely to happen as an adjunct to other events is called:

Options:

A.

Contingent

B.

Critical processes

C.

Conditional delegation

D.

Emergency response

Question 38

Libel is oral defamation; libel is defamation through the written word.

Options:

A.

True

B.

False

Question 39

Which of the following is NOT the activity and concern of a crisis management plan?

Options:

A.

Crisis management team

B.

Disaster operation

C.

Media operation

D.

Vital records

Question 40

What are wide-beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier?

Options:

A.

Floodlights

B.

Search lights

C.

Perimeter lighting

D.

Fresnel Lenses

Question 41

What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?

Options:

A.

Identity fraud

B.

Identity theft

C.

Identity dissemination

D.

Identity Distortion

Question 42

The moment the fire begins, when fuel, air, and an ignition source all come together at the right rate for the correct period of time id called:

Options:

A.

Free burning

B.

Ignition stage

C.

Pyrolysis stage

D.

Incipient stage

Question 43

Which of the following is NOT the distinct action that fall into invasion of privacy?

Options:

A.

misappropriation of the plaintiff’s name or picture for commercial advantage

B.

placing the plaintiff in the false light

C.

private disclosure of public facts

D.

intrusion into the seclusion of another

Question 44

A concept that has grown largely in response to the difficulties faced by merchants in protecting their property from shoplifters and the problems and dangers they face when they make an asset, is called:

Options:

A.

Release

B.

Confinement

C.

Detention

D.

None of the above

Question 45

What is an operational method in which the very act of the attack is dependent upon the death of the perpetrator?

Options:

A.

Time bomb attack

B.

Terrorist attack

C.

Suicide attack

Question 46

A complete contingency planning program has which of the following major elements?

Options:

A.

Emergency response

B.

Crisis management

C.

Business continuity

D.

All of the above

Question 47

What must be thought of as supportive of security operations rather than as the principal defense?

Options:

A.

Insurance

B.

Loss-prevention

C.

Premiums

D.

Bonds

Question 48

In ___________, air has been reduced or fuel is dwindling to the point where there is no visible flame, just an entire area filled with tremendous heat.

Options:

A.

Smoldering burning

B.

Ignition stage

C.

Last stage

D.

Incipient stage

Question 49

Which of the following is NOT of the basic trends of security services?

Options:

A.

Regulate training and standards

B.

Attract better qualified individuals

C.

Disarm security personnel

D.

All of the above

Question 50

__________ is a plant, building, office, institution, or any commercial or industrial structure or complex with all the attendant structures and functions that are part of an integrated operation.

Options:

A.

Facility

B.

Contents

C.

Interior

D.

Padlocks

Question 51

The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:

Options:

A.

Business continuity

B.

Business recovery

C.

Business resumption

D.

Business healing

Question 52

A device that is designed to respond to a certain change in conditions, such as the opening of a door, movement within a room or rapid rise in heat is known as:

Options:

A.

Sounding device

B.

Enunciator

C.

Sending device

D.

Alarm sensor

Question 53

Critical process recovery requires an assessment of resources.

Options:

A.

True

B.

False

Question 54

A system in which a badge or pass coded for authorization to enter specific areas is issued to an employee, who keeps it until the authorization id changed or until he or she leaves the company is called:

Options:

A.

Single pass system

B.

Contractive pass system

C.

Pass-exchange system

D.

None of the above

Demo: 54 questions
Total 120 questions