ASIS-APP Dumps ASIS-APP Braindumps

ASIS-APP Real Questions ASIS-APP Practice Test ASIS-APP Actual Questions


killexams.com


ASIS


ASIS-APP


Associate Protection Professional


https://killexams.com/pass4sure/exam-detail/ASIS-APP


Question: 208


What is the process by which an employer verifies the experience and qualifications presented by a job candidate?

  1. Credentialing

  2. Background Check

  3. Screening

  4. Verification


Answer: A


Question: 209


What are the two basic analytical approaches to a risk assessment?

  1. Compliance based and Descriptive

  2. Quantitively and Qualative

  3. Metrics and Graphical

  4. Compliance based Performance based


Answer: D


Question: 210


What are the four approaches to situational crime prevention?

  1. Increase the effort required (e.g. target hardening, access control), Increased artificial lighting Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting)

  2. Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting)

  3. Increase the effort required (e.g. target hardening, access control), Investment in CPTED Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting)

  4. Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling)


Answer: B


Question: 211


What is defensible space?

  1. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment that would encourage residents to proactively report all security incidents and events in the local environment

  2. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical

    construction of a residential environment could elicit behaviour from residents that would contribute significantly to their safety. It directly leads to increased costs associated with security services

  3. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment would prevent residents from reporting security incidents or events

  4. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behaviour from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance.


Answer: D


Question: 212


What is the typical initiation event in a private sector incident investigation?

  1. An incident report

  2. Alarm activation

  3. Law Enforcement report

  4. Confidential Informant


Answer: A


Question: 213


What five guidelines should be observed for workplace drug purchases that are part of an investigation?

  1. Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use

  2. Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases on company time Record all transactions

  3. Qualify the dealer Coordinate with Legal Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use

  4. Qualify the dealer Coordinate with Legal & HR Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use


Answer: A


Question: 214


One of the following is not prohibited by the Federal Civil Rights Act during an investigation

  1. All

  2. A record

  3. A custodian of record

  4. A public official

Who may edit officers incident entries in a database log?

  1. CISO, CFO, HR, and Legal

  2. Security Officers

  3. Higher level supervisors

  4. Nobody


Answer: C


Question: 216


How does situational crime prevention differ from CPTED and defensible space?

  1. Situational crime prevention seeks to reduce crime opportunities in public and private environments where applicable

  2. Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, not just in the built environment.

  3. Situational crime prevention seeks to reduce crime opportunities through integrating public and private enterprises

  4. Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, in tandem with legal guidelines and oversight


Answer: B


Question: 217


In what two ways can an undercover operative be placed?

  1. Cold Hire (operative applies for a job just like any other applicant) Controlled Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)

  2. Cold Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)

  3. Immediate Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)

  4. Open Hire (operative applies for a job just like any other applicant) Closed Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)


Answer: A


Question: 218


Workplace crime is the function of which three fundamental elements?

  1. Quality of hires Environment in which staff is placed Quality of supervision over environment and staff

  2. Opportunity, Motive, Ability

  3. Opportunity, Motive and quality of personnel

  4. Quality of hires Motivation Quality of supervision over environment and staff

Why might lower-level managers more readily accept a bottom-up budget?

  1. To allow for future operational increases

  2. Because it is a CFO direction

  3. Because they had a role in developing it

  4. To ensure alignment


Answer: C


Question: 220


What are the three main tools of an investigator?

  1. Information Interrogation Instrumentation

  2. Information Analysis Instrumentation

  3. Information Intelligence Instrumentation

  4. Analysis Intelligence Instrumentation


Answer: A


Question: 221


What is the goal of a vulnerability assessment?

  1. To identify physical protection system (PPS) components in the functional areas of site security and to gather data to estimate site performance against particular threats.

  2. To identify physical protection system (PPS) components in the functional areas of entry and access and to gather data to estimate their performance against particular threats.

  3. To identify physical protection system (PPS) components in the functional areas of detection, delay and response and to gather data to estimate their performance against particular threats.

  4. To identify physical protection system (PPS) components in the functional areas of emergency management and business continuity and to gather data to estimate their performance against particular threats.


Answer: C


Question: 222


What is the difference between asset protection and security?

  1. Assets protection includes all security functions, as well as related functions such as investigations, legal oversight, risk management, safety, compliance, and emergency management.

  2. Assets protection includes only physical security related functions.

  3. Assets protection includes all security functions, as well as related functions such as investigations, risk management, safety, human resources, compliance, and emergency management.

  4. Assets protection includes all security functions, as well as related functions such as investigations, risk management, safety, compliance, and emergency management.

With respect to span of control, the greater the degree of sophistication of interaction between supervisors and subordinates, the

  1. Broader the optimum span of control

  2. More difficult it is to identify the optimum span of control

  3. Narrower the optimum span of control

  4. More options there are in choosing the optimum span of control


Answer: A


Question: 224


What type of extremists pose the most dangerous threat to the world today?

  1. Global jihadists

  2. Single ideology extremists

  3. Zero day terrorists

  4. Independence Extremists


Answer: A