Latest ASIS-APP Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : ASIS-APP
Exam Name : Associate Protection Professional
Vendor Name : "ASIS"







ASIS-APP Dumps ASIS-APP Braindumps

ASIS-APP Real Questions ASIS-APP Practice Test ASIS-APP Actual Questions


killexams.com


ASIS


ASIS-APP


Associate Protection Professional


https://killexams.com/pass4sure/exam-detail/ASIS-APP


Question: 1


What is the ‘span of control’ principle?

  1. A single person can supervise only a limited number of staff members effectively (generally up to 6)

  2. A single person can supervise only a limited number of staff members effectively (generally up to 8)

  3. A single person can supervise only a limited number of staff members effectively (generally up to 12)

  4. A single person can supervise only a limited number of staff members effectively (generally up to 10)




Answer: D



Question: 2


What is the design C basis threat?

  1. The cost incurred for the utility being protected. It is used to help design and evaluate a physical protection system (PPS)

  2. The adversary against which the utility must be insured against. It is used to help design and evaluate a physical protection system (PPS) by the CISO

  3. The cost incurred for the person being protected.

  4. The adversary against which the utility must be protected. It is used to help design and evaluate a physical protection system (PPS)




Answer: D



Question: 3


What is a mutual aid association?

  1. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies.

  2. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies on a cost basis.

  3. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies at cost for the duration of the arrangement

  4. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies. It is subject to the limit of the emergency.




Answer: A



Question: 4


Which of the following is an advantage of having investigation conducted by in-house security staff?

  1. In-house staff has better grasp as to objective of the investigation

  2. Cheaper as a general rule, depending on number of check being done

  3. In-house staff has better sources of information

  4. In-house staff is better trained



Answer: A



Question: 5


What is a Business impact analysis (BIA)?

  1. A BIA is a tool used to: Identify an entity’s critical functions Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop and prioritize recovery strategies

  2. A BIA is a tool used to: Identify an entity’s communication structure Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop and prioritize recovery strategies

  3. A BIA is a tool used to: Identify an entity’s critical functions Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop the cost associated with the emergency

  4. A BIA is a tool used to: Identify key stakeholders Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop and prioritize recovery strategies




Answer: A



Question: 6


What are the three contributors to cost of replacement?

  1. Repair and Replacement cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional

  2. Insurance Cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional

  3. Upgrade Cost including replacement fee Freight and Shipping charges Make C ready or preparation cost to install it or make it functional

  4. Purchase price or manufacturing cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional




Answer: D



Question: 7


What is the ‘necessary human being’ concept?

  1. The particular characteristics and reactions required at a security post necessitate human capabilities

  2. Dependant characteristics of a human operating a security system

  3. The particular characteristics and reactions required at a security post that do not necessitate human capabilities

  4. The particular characteristics and reactions required at a security post that can be recovered and upgraded by mechanical means




Answer: A



Question: 8


What are the four approaches to terrorism analysis?

  1. Multicausal Political Organisational Psychological

  2. Geopolitical Political Organisational Psychological

  3. Historical Political Organisational Psychological

  4. Financial Political Organisational Psychological




Answer: A



Question: 9


What are the four types of emergency drill formats?

  1. Tabletop exercise Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies

  2. Tabletop exercise Evacuation/shelter in place drill Comms walkthrough Full exercise with outside response agencies

  3. Lead exercise Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies

  4. Tabletop exercise with Law Enforcement Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies




Answer: A



Question: 10


In investigations, what’s the difference between an analysis diagram and a horizontal diagram?

  1. An analysis diagram links details regarding persons, events, etc during an investigation. A horizontal diagram compares different periods of a company’s financial statement that will be beneficial during a fraud investigation

  2. An analysis diagram links details regarding property and events A horizontal diagram compares different periods of a company’s security statement that will be beneficial during a fraud investigation

  3. An analysis diagram links details regarding timeline, incidents and events, etc during an investigation. A horizontal diagram compares different sections of a company’s annual loss statement that will be beneficial during a fraud investigation

  4. An analysis diagram links details the reporting chain used during an investigation, that includes the CSO and the COO A horizontal diagram compares different periods of a company’s financial statement that will be beneficial during a fraud investigation




Answer: A



Question: 11


What are indirect costs to security?

  1. Harm to Reputation Loss of goodwill Loss of employees Harm to employee morale

  2. Harm to Reputation Loss of goodwill Loss of employees Insurance Costs

  3. Increased Alarm Rates Indirect Career Progression Loss of employees Harm to employee morale

  4. Harm to Reputation Loss of goodwill Loss of contract Harm to Business




Answer: A



Question: 12

According to Fennelly, what are the three key tools in crime prevention programs?

  1. Planning Management Cost

  2. Planning Management Evaluation

  3. Planning Management Availability

  4. Planning Management Communication




Answer: B



Question: 13


Any person may affect an arrest without warrant when he/she

  1. Has reasonable grounds to believe that an individual has committed a criminal offence and is escaping from and freshly pursued by persons who have lawful authority to arrest that individual

  2. Has reasonable grounds to believe that the individual will fail to attend court

  3. Has reasonable grounds to believe that a person has committed an indictable offence

  4. Finds an individual committing any offence




Answer: A



Question: 14


What is the formula for lost income cost?

  1. I = i/365 x P x t, where: I = Income earned I = annual percent loss of return P = Principal amount) in dollars) available for investment t = time (in days) during which P is available for investment

  2. I = i/365 x P x t, where: I = Income lost I = annual percent rate of return P = Principal amount) in dollars) available for investment t = time (in days) during which P is available for investment

  3. I = i/365 x P x t, where: I = Income earned I = annual percent rate of return P = Principal amount) in dollars) available for investment t = time (in days) during which P is available for investment

  4. I = i/365 x P x t, where: I = Income earned I = annual percent rate of return P = Principal amount) in dollars) lost on investment t = time (in days) during which P is available for investment




Answer: C



Question: 15


Why are emergency management tests and exercises conducted?

  1. To check workability of the plan To determine levels of staff awareness and training To evaluate emergency communications To identify shortcomings in evacuation procedures

  2. To check the cost of the plan To determine levels of staff awareness and training To evaluate emergency communications To identify shortcomings in evacuation procedures

  3. To check workability of the plan To determine levels of compliance To evaluate emergency communications To identify shortcomings in evacuation procedures

  4. To check workability of the plan To determine levels of staff awareness and training To review communications strategy To identify shortcomings in evacuation procedures




Answer: A


Question: 16


How do aggressors decide to commit workplace violence?

  1. Not by ‘snapping’, but through a process of emotional escalation, or, with psychopaths, non-emotional decision making

  2. Through planned action

  3. By ‘snapping’ as a result of perceived injustice

  4. In response to a confirmed slight or ‘wrong’




Answer: A



Question: 17


What organisation is the world’s largest developer of international standards?

  1. ASIS

  2. WHO

  3. ISO, the International Organisation for Standardisation

  4. European Union




Answer: C



Question: 18


What is the most important relationship for security during a strike?

  1. The relationship with local law enforcement

  2. The relationship with unions

  3. The relationship with HR & Legal

  4. The relationship between law enforcement and legal




Answer: A



Question: 19


What are the three primary functions of security lighting?

  1. Deterrence Life safety Video lighting

  2. Deterrence Incident Recording Video lighting

  3. Prevention and Retention Life safety Video lighting

  4. Incident Management Life safety Video lighting Video lighting




Answer: A



Question: 20


Who should have access to the emergency telephone numbers of key personnel?

  1. Staff in control centres Senior personnel with plan implementation responsibilities

  2. Security personnel in control centres Senior personnel with plan implementation responsibilities

  3. Staff in control centres Legal personnel with plan implementation responsibilities

  4. Staff in control centres Emergency Management personnel with plan implementation responsibilities




Answer: A



Question: 21


What are the two most commonly abused drugs in the workplace?

  1. #1 Alcohol #2 Marijuana

  2. #1 Alcohol #2 Nicotine

  3. #1 Nicotine #2 Marijuana

  4. #1 Alcohol #2 PCP




Answer: A



Question: 22


How long do the effects of controlled release OxyContin last?

  1. 8 to 12 hours

  2. 10 to 12 hours

  3. 8 to 14 hours

  4. 8 to 16 hours




Answer: A



Question: 23


What are the five phases of an undercover operation?

  1. Planning and preparation Information gathering C operative placed Verification and analysis C operative removed Discipline and corrective action Prevention and education

  2. Law Enforcement Engagement Information gathering C operative placed Verification and analysis C operative removed Discipline and corrective action Prevention and education

  3. Planning and preparation Information gathering C operative placed Verification and analysis C operative removed Legal Action Prevention and education

  4. Planning and preparation Information gathering C operative placed Verification and analysis C operative removed Discipline and corrective action Law Enforcement engagement




Answer: A



Question: 24


What are the four stages of an investigative reporting process?

  1. Initial report Progress report (within 30 days of initial report) Special report Final report

  2. Initial report Progress report (within 20 days of initial report) Special report Final report

  3. Initial report Progress report (within 40 days of initial report) Special report Final report

  4. Initial report Progress report (within 50 days of initial report) Special report Final report



Answer: A



Question: 25


What is key to a sound back story of an undercover operative?

  1. Personal details that are not true but are known to the targeted employee, such as schools attended, former workplaces, or previous home neighbourhoods

  2. Plausible & realistic

  3. One that is easily remembered

  4. A detailed history with a verifiable background




Answer: A



Question: 26


What is the vulnerability assessments team’s primary job as it pertains to a physical protection system (PPS)?

  1. To determine security system effectiveness.

  2. To secure a site

  3. To record system violations

  4. To determine the alarm response ratio




Answer: A



Question: 27


What is the best way to prepare for workplace misconduct investigations?

  1. Coordinate as soon as possible with the HR director and corporate legal counsel because of the possibility of employee legal action

  2. Source a secure location to conduct interviews

  3. Review the initiation report

  4. Coordinate with Law Enforcement and Legal Counsel




Answer: A



Question: 28


When should a supervisor visit a security post?

  1. Regularly, in an unscheduled manner

  2. Once per hour

  3. Twice per hour

  4. Six times during 9 hour shift




Answer: A


Question: 29


What type of specimen is analysed most often in drug tests?

  1. Urine

  2. Hair

  3. Saliva

  4. Blood




Answer: A



Question: 30


What are the three standard financial reports?

  1. Income statement Balance sheet Statement of cash flows

  2. Income statement Bank statement Statement of cash flows

  3. Income statement Balance sheet Statement of assets

  4. Income statement Balance sheet Share value




Answer: A



Question: 31


How frequently should investigative summaries of undercover operations be produced?

  1. Typically, summaries are prepared after the operative has completed 10 consecutive days of work

  2. Typically, summaries are prepared after the operative has completed 20 consecutive days of work

  3. Typically, summaries are prepared after the operative has completed 30 consecutive days of work

  4. Typically, summaries are prepared after the operative has completed 25 consecutive days of work




Answer: A



Question: 32


What does an income statement show?

  1. Revenue Expenses Statement of Assets

  2. Revenue Expenses Share value

  3. Revenue Expenses Closing balance

  4. Revenue Expenses Net income over a defined period




Answer: D



Question: 33


What is the current ratio?

  1. The current ratio is a measure of a company’s ability to cover medium term obligations Current ratio = current assets/current liabilities

  2. The current ratio is a measure of a company’s ability to cover long term obligations Current ratio = current

    assets/current liabilities

  3. The current ratio is a measure of a company’s ability to cover immediate obligations Current ratio = current assets/current liabilities

  4. The current ratio is a measure of a company’s ability to cover short term obligations Current ratio = current assets/current liabilities




Answer: D



Question: 34


What are the three general measures to valuing assets?

  1. Cost Consequence criteria Policy

  2. Insurance Fees Consequence criteria Policy

  3. Asset Liability Consequence criteria Policy

  4. Value of the Assets Consequence criteria Policy




Answer: A



Question: 35


Selection devices in the personnel selection process used by managers to reduce accept and reject errors include

  1. Performance-simulation tests, application forms, resume, interviews

  2. Application form, resume, pencil and paper tests, interviews

  3. Performance-simulation tests, drug screening, applications form, resume

  4. Application form, pencil and paper tests, performance-simulation tests, interviews




Answer: A



Question: 36


What does a cash flow statement show?

  1. Available funds to the organisation

  2. How cash inflows and outflows affect an organisation

  3. Funds due to the organisation

  4. Available funds allocated for the financial year




Answer: B



Question: 37


A claimant’s allegation of invasion of privacy would be appropriately supported in a situation where the alleged perpetrator:

  1. Revealed damaging information from a police file to the claimant’s spouse

  2. Revealed further details about a matter that was reported in a published biography of the claimant

  3. Mentioned during a televised interview a rumor about the claimant engaging in criminal activity

  4. Repeated a story that the claimant was overheard telling in a crowded public place



Answer: A



Question: 38


Which of the following is not true with regard to door latches?

  1. Both B and C

  2. Chain latches are highly recommended as effective security measures

  3. A dead-bolt latch is very expensive

  4. A dead-bolt latch increases the security posture of the facility




Answer: A



Question: 39


What is the overall objective of an investigation?

  1. A successful outcome or resolution of the case

  2. To secure a conviction

  3. To recover stolen items

  4. To identify those involved in a crime




Answer: A



Question: 40


What are the three managerial dimensions of assets protection?

  1. Technical expertise Management ability Communications

  2. Academic Qualifications Management ability Ability to deal with people

  3. Technical expertise Operational ability Ability to deal with people

  4. Technical expertise Management ability Ability to deal with people




Answer: D



Question: 41


In the development of a security program using the systems approach, the three general elements that must be given consideration are:

  1. A vulnerability analysis, implementation of countermeasures, and a test of the operating program

  2. The installation of fencing, locks, and alarms

  3. Pre-employment screening, policies, and standardized procedure

  4. A loss prevention program, risk analysis, and recovery documentation




Answer: A



Question: 42

What system reduces the possibility that a facility badge can be counterfeited, lost, or stolen?

  1. 62 Bit Encryption

  2. Proximity Badge

  3. 32 Bit Encryption

  4. An exchange badge system




Answer: D



Question: 43


What is perhaps the best way to achieve funding for an Investigations Unit (IU)?

  1. Demonstrate how the unit pays for itself

  2. Provide case statistics

  3. Direct from Physical Security Budget

  4. Demonstrate successful case load




Answer: A



Question: 44


The cardinal rule in management of a transportation concern is that those assigned to line hauling duties must be

  1. Willing and able to discuss their cargo

  2. In possession of extra cargo seals

  3. Capable of lifting more than 50 lbs.

  4. Of the highest integrity




Answer: A



Question: 45


How many years of prior work history should a job application ask for?

  1. At least 7 to 10 years

  2. At least 7 to 12 years

  3. At least 7 to 15 years

  4. At least 12 to 15 years




Answer: A



Question: 46


What are post orders based on?

  1. Legal Guidelines

  2. Standard Operating Procedures

  3. Client Needs

  4. Location and hours of work



Answer: B



Question: 47


Why might companies keep secret the existence of kidnap, ransom, and extortion policies from their personnel?

  1. To avoid being targeted

  2. To prevent negative press

  3. To comply with company legislation

  4. To ensure alignment




Answer: A



Question: 48


A well-engineered physical protection system (PPS) exhibits which three characteristics?

  1. Protection in Depth Minimum consequence of component failure (redundancy) 360 Coverage

  2. Protection in Depth Minimum consequence of component failure (redundancy) Balanced protection

  3. Protection in Depth Minimum consequence of component failure (redundancy) Power Redundancy

  4. Protection in Depth Layered Perimeter Utility Support




Answer: B



Question: 49


What are the three ways to measure profit margins?

  1. Gross profit margin = (revenue C cost of goods bought C general and administrative costs)/revenue Operating margin = EBITA (earnings after interest, taxes, and amortization)/ revenue

  2. Gross profit margin = (revenue C cost of goods bought C general and administrative costs)/revenue Operating margin = EBITA (earnings before interest, taxes, and amortization)/ revenue

  3. Gross profit margin = (revenue C cost of goods sold C general and administrative costs)/revenue Operating margin

    = EBITA (earnings before interest, taxes, and amortization)/ revenue

  4. Gross profit margin = (revenue C cost of goods sold C general and administrative costs)/revenue Operating margin

= EBITA (earnings after interest, taxes, and amortization)/ revenue




Answer: C



Question: 50


According to Oatman, what are the six principles that should guide thinking about executive protection?

  1. Prevent and avoid danger Realize that anyone can protect anyone Don’t stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on technology

  2. Prevent and avoid danger Realize that anyone can protect anyone Stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on brains, not on technology

  3. Prevent and avoid danger Only team members can protect anyone Stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on brains, not on technology

  4. Prevent and avoid danger Realize that anyone can protect anyone Don’t stop to think Keep clients out of trouble

Understand the security vs convenience continuum Rely on brains, not on technology




Answer: D



Question: 51


What are the four main types of CCTV cameras?

  1. Standard analog CCD Dome Infrared Thermal

  2. Standard analog CCD IP Infrared Thermal

  3. Standard analog CCD Bullet Infrared Thermal

  4. Standard analog CCD Fixed Infrared Thermal




Answer: B



Question: 52


How long should a strategic plan look out into the future?

  1. Three to ten years

  2. Three to six years

  3. Three to five years

  4. Three to seven years




Answer: C



Question: 53


What is the preferred glass type for mitigating blast forces?

  1. Laminated glass is preferred for mitigating blast forces

  2. Sheet Glass

  3. Plexiglass

  4. Single reinforced glazing




Answer: A



Question: 54


What are the four main strategies of second generation CPTED (the four C’s) ?

  1. Cohesion Capacity threshold (tipping point) Creativity Connectivity

  2. Cohesion Capacity threshold (tipping point) Communication Connectivity

  3. Cohesion Capacity threshold (tipping point) Community culture Connectivity

  4. Cohesion Capacity threshold (tipping point) Collaboration Connectivity




Answer: C


Question: 55


What are the elements of a systems approach to developing a physical protection system (PPS)?

  1. Assessment of needs Implementation of countermeasures Evaluation of effectiveness

  2. Assessment of vulnerability Implementation of countermeasures Evaluation of effectiveness

  3. Assessment of vulnerability Evaluation of effectiveness and Defence in Depth

  4. Assessment of needs Implementation of countermeasures Evaluation of effectiveness




Answer: B



Question: 56


In what situation is protecting investigative information particularly difficult?

  1. Protecting information can be difficult when working with joint task forces, because each participating agency likely has different policies, definitions, perspectives, and attitudes towards what is sensitive and warrants protection

  2. Protecting information can be difficult when working with joint task forces, because each participating agency will have different information handling and storage programs

  3. Protecting information can be difficult when working with joint task forces, because each participating agency likely will be reporting to individual stakeholders none of whom are in the same reporting chain

  4. Protecting information can be difficult when working with joint task forces, because each participating agency can be subject to competing multi-jurisdictional legal oversight issues




Answer: A



Question: 57


When is the best time to remove an undercover operative?

  1. When he or she is named as an offender by co-workers

  2. Outside of working hours

  3. On approval from LE

  4. On approval from HR & Legal




Answer: A



Question: 58


How should change or corrections be made in officers written log entries?

  1. Entered in Red Ink and signed by Security Officer & Manager

  2. Entered in Red Ink

  3. Entered in Red Ink and signed by Security Officer

  4. Under a new event number as a separate item




Answer: D



Question: 59

What is the quick ratio?

  1. The quick ratio is a measure of an organisations ability to cover current liabilities with current assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/current liabilities

  2. The quick ratio is a measure of an organisations ability to cover projected liabilities with current assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/projected liabilities

  3. The quick ratio is a measure of an organisations ability to cover future liabilities with current assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/future liabilities

  4. The quick ratio is a measure of an organisations ability to cover current liabilities with borrowed assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/borrowed liabilities




Answer: A



Question: 60


What kind of legal privilege is typically granted to properly controlled investigative reports?

  1. Qualified privilege, protecting against defamation suits

  2. Qualified privilege, Protection against criminal prosecution

  3. Personal Injury protection, protecting against defamation suits

  4. Qualified privilege, protection against investigation




Answer: A



Question: 61


According to the FBI, what are the six steps of protecting a business from espionage?

  1. Recognise the (insider or outsider) threat Identify and value trade secrets Implement a proactive plan for protecting trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection

  2. Recognise the (insider or outsider) threat Close Trade secrets Implement a proactive plan for protecting trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection

  3. Recognise the (insider or outsider) threat Identify and value trade secrets Implement Disaster Recovery Plans Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection

  4. Recognise the (insider or outsider) threat Define Key Stakeholders Implement a proactive plan for protecting trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection




Answer: A



Question: 62


What three questions does a risk assessment attempt to answer?

  1. What Protocols currently exist? What is the likelihood it would go wrong? What are the consequences?

  2. What can go wrong? What is the cost associated? What are the consequences?

  3. What resources are available? What is the likelihood it would go wrong? What are the consequences?

  4. What can go wrong? What is the likelihood it would go wrong? What are the consequences?



Answer: D



Question: 63


What are the three types of CPTED solutions?

  1. Mechanical measures Electronic Lighting and Direction of Flow

  2. Legal Guidelines Human and organisational measures Natural measures

  3. Mechanical measures Human and organisational measures Lighting and Direction

  4. Mechanical measures Human and organisational measures Natural measures




Answer: D



Question: 64


How many years of experience should a new investigative hire have?

  1. As a rule of thumb, new hires should have at least two years of experience conducting investigations

  2. As a rule of thumb, new hires should have at least three years of experience conducting investigations

  3. As a rule of thumb, new hires should have at least four years of experience conducting investigations

  4. As a rule of thumb, new hires should have at least five years of experience conducting investigations




Answer: A



Question: 65


What is the best way to recruit a good candidate for a job?

  1. Internal recommendations

  2. Open competitions

  3. Direct Appointments

  4. Closed competitions




Answer: A



Question: 66


What three factors should determine selection of a CCTV camera?

  1. Sensitivity Degradation Features

  2. Sensitivity Resolution Features

  3. Sensitivity Degradation Timing

  4. Resolution Degradation Timing




Answer: B



Question: 67

What does a balance sheet show?

  1. A summary of an organisations investing and financing

  2. A summary of an organisations profits and loss

  3. A summary of an organisations share value

  4. A summary of an organisations RSU schedule




Answer: A



Question: 68


What are the three levels of assessment for violent risk among known subjects?

  1. Initial Threshold Comprehensive

  2. Initial Threshold Violent

  3. Initial Assessment Comprehensive

  4. Immediate Threshold Comprehensive




Answer: A



Question: 69


In Pastor’s public/private, substitute/supplement model of policing, which cell represents the rarest scenario?

  1. Public/Private

  2. Private/Industrial

  3. Public/Substitute

  4. Private/Substitute




Answer: C



Question: 70


What are the main functions of a physical protection system (PPS)?

  1. The primary functions are detection, delay, and record. Deterrence is a secondary function.

  2. The primary functions are direct, delay, and response. Deterrence is a secondary function.

  3. The primary functions are determine, delay, and response. Deterrence is a secondary function.

  4. The primary functions are detection, delay, and response. Deterrence is a secondary function.




Answer: D



Question: 71


What is ‘minimum resolvable temperature’?

  1. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder, activity and the background.

  2. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between staged sensors

  3. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an

    intruder and the site environment.

  4. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder and the background.




Answer: D



Question: 72


What are the two general types of insurance?

  1. Personal Accidental

  2. Property Liability

  3. Property Travel

  4. Property Accidental




Answer: B



Question: 73


What are the three primary functions of a physical protection system (PPS)?

  1. Detection Delay Response

  2. Assess Report Response

  3. Record Deny Respond

  4. Identify Deny Respond




Answer: A



Question: 74


Where are executives most vulnerable to attack?

  1. At home

  2. At work

  3. In transit

  4. While exercising




Answer: A



Question: 75


What theory underpins situational crime prevention?

  1. Motive and Opportunity

  2. Geo political theory

  3. Criminal Law

  4. Rational choice theory



Answer: D



Question: 76


For insurance against business interruption, what are the two types of valuation methods?

  1. Perceived loss sustained Valued loss

  2. Actual loss sustained Valued loss

  3. Actual loss sustained Insured loss sustained

  4. Actual loss sustained Incurred replacement cost




Answer: B



Question: 77


What are three major pitfalls of using online information sources for investigations?

  1. Going off on a tangent/spending too much time online Assuming online information is credible without exploring further Searching online sources may not be best use of an investigator’s time

  2. Reliability Accuracy Safety

  3. Robustness Legal Considerations Search Parameters

  4. Reliability Accuracy Security of source




Answer: A



Question: 78


What are the five basic coverages of crime insurance policy?

  1. Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Harassment Bond

  2. Employee Injury bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Depositors forgery coverage

  3. Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Depositors forgery coverage

  4. Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Theft and forgery coverage




Answer: C



Question: 79


What is generally the most practical approach to budget development?

  1. A combination of top down and bottom up processes and mutual forecasting

  2. A top down approach

  3. A bottom up approach

  4. A combination of top down and bottom up processes




Answer: D


Question: 80


Which of the following is not generally true regarding money safes?

  1. Both C & D

  2. Those manufactured prior to 1960 have round doors

  3. They provide good protection against fire

  4. They always have wheels




Answer: A



Question: 81


What is the biggest vulnerability of a loop system?

  1. All the detectors in an area could be disabled by interrupting the loop at the proper location

  2. Physical Intervention

  3. Power interruption

  4. Detectors not being recorded on a system




Answer: A



Question: 82


What are the three ways of verifying personnel entry?

  1. Who you are (role) What you know (PIN, password) What you have (badge)

  2. Who you are (role) What you know (PIN, password) What you are (biometrics)

  3. What you have (credential) What you know (PIN, password) What you are (biometrics)

  4. What you have (credential) What you carry (YubiKey) What you are (biometrics)




Answer: C



Question: 83


During a trip with a principle, what are the three key concepts for an executive protection (EP) specialist to remember?

  1. Keep a low profile Stay away from problem areas and situations Know what to do if trouble arises

  2. Keep a low profile Stay away from problem areas and situations Contact Law Enforcement

  3. Keep a low profile Stay away from problem areas and situations Secure transport

  4. Keep a low profile Define scope of ops Know what to do if trouble arises




Answer: A



Question: 84


In its basic sense, the investigative process reflects

  1. A simple statement of all the abstracts encountered

  2. The mindset of the investigator

  3. Precise controlled examination

  4. Absolute goal-oriented inquiry




Answer: A



Question: 85


Who is the person responsible for maintaining and archiving closed case files, including all notes, reports and summaries?

  1. The custodian of record

  2. The security manager

  3. The HR Rep

  4. The Project Manager




Answer: A



Question: 86


What are the three most common methods of training protection dogs?

  1. Positive reinforcement (praise) Compulsion (negative corrections) Inducement (toys, foods)

  2. Positive reinforcement (praise) Compulsion (negative corrections) Punishment (corrections)

  3. Positive reinforcement (praise) Communication (talking) Inducement (toys, foods)

  4. Repeated Performance (repeat exercise) Compulsion (negative corrections) Inducement (toys, foods)




Answer: A



Question: 87


What are the five Ds of security?

  1. Divide Deny Detect Delay Destroy

  2. Defend Deny Detect Delay Destroy

  3. Define Deny Detect Delay Destroy

  4. Deter Deny Detect Delay Destroy




Answer: D



Question: 88


Field welds and brazing on factory boxes, enclosures, and conduits should be coated with what?

  1. Cold galvanized paint containing at least 95 percent zinc by weight

  2. Cold galvanized paint containing at least 75 percent zinc by weight

  3. Cold galvanized paint containing at least 65 percent zinc by weight

  4. Cold galvanized paint containing at least 55 percent zinc by weight




Answer: A


Question: 89


What is the ‘broken windows’ theory?

  1. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is observed.

  2. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of the drop in value of a site

  3. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of higher costs associated with security services

  4. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to a reduction of Law Enforcement patrolling and response to a location




Answer: A



Question: 90


What is a Trademark

  1. Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.

  2. Legal protection for a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.

  3. Legal protection of the expression of ideas in corporate law and policy.

  4. Legal protection of the expression of ideas in literary, artistic, and musical works.




Answer: A



Question: 91


Who should be responsible for shutting down equipment in an emergency?

  1. Those already familiar with the process.

  2. Senior Engineer on Duty

  3. All Security Personnel

  4. Chief Security Officer on duty




Answer: A



Question: 92


According to Davidov and Malone, what is the centrepiece of the new global economy?

  1. The relationship between economics, security and policy

  2. Economics and Technology

  3. Vendor Ownership and Management Process recognition

  4. The virtual product, where major business functions are outsourced with hardly any internal departmentalization.




Answer: D


Question: 93


What are the three types of attacks used to defeat an access-controlled entry point?

  1. Deceit Physical attack Technical attack

  2. Social Engineering Physical attack Technical attack

  3. Assault Physical attack Technical attack

  4. Bribery Physical attack Technical attack




Answer: A



Question: 94


What four questions does risk management attempt to answer?

  1. What can be done? What options are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options?

  2. What is the cost? What options are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options?

  3. What can be done? What protocols are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options?

  4. Who is responsible for completing the Risk Management matrix? What options are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options?




Answer: A



Question: 95


What are the three classifications of loss in Insurance policies?

  1. Direct Loss Loss of use Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)

  2. Indirect Loss Loss of use Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)

  3. Direct Loss Replacement Cost Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)

  4. Indirect Loss Replacement Cost Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)




Answer: A



Question: 96


What are the five most common identifiers used to verify education history in a background check?

  1. Name while attending school Dates of attendance Graduation date Degree obtained Date of birth

  2. Name of primary school Dates of attendance Graduation date Degree obtained Date of birth

  3. Name while attending school Dates of attendance Qualification attained Degree obtained Date of birth

  4. Name while attending school Dates of attendance Country of Birth Degree obtained Date of birth




Answer: A



Question: 97

What value does company prosecution of employee drug offenses have?

  1. Minimal value

  2. More than $1000

  3. More than $1500

  4. Value less than $2000




Answer: A



Question: 98


What is the debt to equity ratio?

  1. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder securities

  2. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder liabilities

  3. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder equity

  4. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder accounts




Answer: C



Question: 99


In an investigation, what is generally the best reporting chain from the source of information to the decision maker?

  1. The shortest one

  2. Direct to CISO

  3. Direct to LE Partner

  4. To the Project Management Team




Answer: A



Question: 100


The three basic types of glass are

  1. Tinted, reflective, and insulated

  2. Heavy duty, medium duty and light duty

  3. Tempered, reinforced and coated

  4. Sheet, plate, and float




Answer: A



Question: 101


What are the five avenues of addressing risk?

  1. Analysis Transfer Spreading Reduction Acceptance

  2. Replacement Transfer Spreading Reduction Acceptance

  3. Avoidance Transfer Spreading Reduction Acceptance

  4. Review Transfer Spreading Reduction Acceptance




Answer: C



Question: 102


A major concern of a company, above all else, should be

  1. The care and well-being of its employees

  2. Reduction of shrinkage

  3. Policies and procedures

  4. Internal theft




Answer: A



Question: 103


What is natural territorial reinforcement?

  1. Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and accountability in property owners, managers, or occupants to increase vigilance in identifying trespassers.

  2. Construction of environmental barriers

  3. Natural territorial reinforcement is the process of integrating property with lighting

  4. Natural territorial reinforcement is the process of establishing a reporting system tied to a monitoring station




Answer: A



Question: 104


What are the three types of emergency operations plans?

  1. All hazards Standalone (different for reach emergency) Combination of all-hazards and standalone

  2. Medical hazards Standalone (different for reach emergency) Combination of all-hazards and standalone

  3. Natural Hazards Standalone (different for reach emergency) Combination of all-hazards and standalone

  4. Artificial hazards Standalone (different for reach emergency) Combination of all-hazards and standalone




Answer: A



Question: 105


What are the most common type of investigations in business settings?

  1. Incident investigations

  2. Harassment Investigations

  3. Assault investigations

  4. Theft Investigations



Answer: A



Question: 106


What is the best way to addressing infringements of copyrights, patents, and trademarks?

  1. By registering those rights

  2. By securing a trademark

  3. By security a copyright

  4. By securing a Patent




Answer: A



Question: 107


Which stakeholder group drives the ANSI standards development process?

  1. Consumers

  2. Government

  3. Industry Experts and Academics

  4. Standards users




Answer: D



Question: 108


What two ratios show how an organisation has done in making money during a reporting period?

  1. Return on assets = net income/total assets Return on equity = net income/shareholder equity

  2. Return on assets = net income/total shares Return on equity = net income/shareholder equity

  3. Return on assets = net shares/total shares Return on equity = net income/shareholder equity

  4. Return on assets = net income/total assets Return on equity = net outcomes/shareholder equity




Answer: A



Question: 109


Which two ratios demonstrate how well a firm has done in making money for a reporting period?

  1. Return on assets = net assets/total assets Return on equity = net income/shareholder equity

  2. Return on assets = net income/total assets Return on equity = net income/shareholder equity

  3. Return on assets = net income/total assets Return on equity = net outgoings/shareholder equity

  4. Return on assets = net income/total equity Return on equity = net income/shareholder equity




Answer: B



Question: 110


What members should comprise a vulnerability assessment team?

  1. Security specialist (leader) Security Systems engineer Response expert Data analyst Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts)

  2. Security specialist (leader) Security Systems engineer Response expert HR expert Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts)

  3. Security specialist (leader) Security Systems engineer Response expert CFO Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts)

  4. Security specialist (leader) Security Systems engineer Response expert CISO Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts)




Answer: B



Question: 111


How long does withdrawal from narcotics take?

  1. 7 to 10 days

  2. 7 to 12 days

  3. 7 to 14 days

  4. 7 to 16 days




Answer: A



Question: 112


Who should be involved in developing a standard?

  1. A broad group of stakeholders and interested parties, working collaboratively

  2. Industry Experts

  3. Industry Experts and Academics

  4. Public and Private partnership




Answer: A



Question: 113


What organisation is the administrator and coordinator of the US private sector voluntary standardization system?

  1. The American National Standards Academy (ANSA)

  2. The American National Standards Institute (ANSI)

  3. ASIS

  4. The American National Standards Organisation (ANSO)




Answer: B



Question: 114


What are the first steps in upgrading a facility’s resistance to penetration?

  1. Defence in Depth

  2. Layered Protection

  3. Eliminating unnecessary doors and windows

  4. Technical Protection measures




Answer: C



Question: 115


What are the five principal resources of an Investigations Unit (IU)?

  1. People Information Credibility Physical assets Financial assets

  2. People Information Analysis Physical assets Financial assets

  3. People Information Intelligence Physical assets Financial assets

  4. Systems Information Credibility Physical assets Financial assets




Answer: A



Question: 116


How many workplace violence incidents are committed annually by intimates of the victim? A. 18,700

B. 18,500

C. 18,000

D. 19,000




Answer: A



Question: 117


What are the thee most critical threats in high-rise structures?

  1. Fire Explosion Terrorism

  2. Fire Explosion Personnel

  3. Fire Explosion Infrastructure Damage

  4. Fire Explosion Contamination of support systems




Answer: D



Question: 118


What is the cost of loss formula?

  1. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of temporary insurance Ct = cost of temporary substitute Cr = total related costs Ci = lost income costs I = available insurance or indemnity a = allocable insurance premium amount

  2. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent insurance Ct = cost of temporary substitute Cr = total related costs Ci = lost income costs I = available

    insurance or indemnity a = allocable insurance premium amount

  3. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent replacement Ct = cost of temporary substitute Cr = total related costs Ci = lost income costs I = available insurance or indemnity a =

    allocable insurance premium amount

  4. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent replacement Ct = cost of temporary substitute Cr = total insurable costs Ci = lost income costs I = available insurance or indemnity a = allocable insurance premium amount




Answer: C



Question: 119


What is an effective way of setting the value of line items in a budget?

  1. Look at each budget expense as an investment and calculate the expected return on that investment

  2. Look at each budget expense as an investment and reduce the expected return on that investment

  3. Look at each budget expense as an investment and divide the expected return on that investment

  4. Look at each budget expense on its own and calculate the expected return on projected investments




Answer: A



Question: 120


How often should an emergency operations plan be audited?

  1. At least annually. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes.

  2. At least quarterly. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes.

  3. On demand. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes.

  4. Periodically. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes.




Answer: A



Question: 121


What are the five elements of the Incident Command System?

  1. Command Operations Planning Logistics Finance and administration

  2. Command Communications Planning Logistics Finance and administration

  3. Command Operations Legal Logistics Finance and administration

  4. Command Operations Planning Logistics HR




Answer: A



Question: 122


What are the immediate effects of cocaine use?

  1. Dilated pupils Elevated blood pressure Increased heart rate Euphoria

  2. Impaired reflexes Slurred speech Uncontrollable drowsiness

  3. Impaired reflexes Anger Uncontrollable drowsiness

  4. Impaired reflexes Slurred speech Detached interest




Answer: A



Question: 123


What are the four elements of emergency management?

  1. Mitigation Preparedness Response Recovery

  2. Communication Preparedness Response Recovery

  3. Mitigation Preparedness Resilience Recovery

  4. Mitigation Preparedness Response Reduction




Answer: A



Question: 124


Under what three conditions should undercover investigations definitely NOT be used?

  1. To investigate activity permitted or protected by law To replace a less costly form of investigation that will yield the same results To investigate protected union activities

  2. To investigate medical negligence cases To replace a less costly form of investigation that will yield the same results To investigate protected union activities

  3. To investigate activity permitted or protected by law To replace a less costly form of investigation that will yield the same results To investigate Law Enforcement incidents

  4. To investigate activity permitted or protected by law To investigate activities associated with minors To investigate protected union activities




Answer: A



Question: 125


What three elements are depicted in a cash flow statement?

  1. Net operating cash flow Net investing cash flow Pending funds due

  2. Net operating cash flow Net investing cash flow End of year statement

  3. Net operating cash flow Net investing cash flow Expected cash flow

  4. Net operating cash flow Net investing cash flow Financing cash flow




Answer: D



Question: 126


What are the three levels of investigative management?

  1. Strategic Operational Case

  2. Strategic Pivotal Case

  3. Personal Operational Case

  4. Commercial Operational Case



Answer: A



Question: 127


Who should be involved in developing a job requirements analysis?

  1. The hiring manager HR Team Legal Team

  2. The hiring manager HR Team Organisational leaders

  3. The hiring manager Other team members Organisational leaders

  4. The hiring manager HR Team Security Liaison




Answer: C



Question: 128


Who is the only corporate official who should retain a copy of an investigative report?

  1. The attorney of record

  2. CISO

  3. Law Enforcement

  4. Security Manager




Answer: A



Question: 129


What are some effects of depressants in large doses?

  1. Impaired reflexes Slurred speech Uncontrollable drowsiness

  2. Impaired reflexes Anger Uncontrollable drowsiness

  3. Impaired reflexes Slurred speech Detached interest

  4. Hunger and thirst Slurred speech Uncontrollable drowsiness




Answer: A



Question: 130


Department of Defense regulations regarding the protection of classified information requires that defense contractors maintain accountability of top secret information for a minimum time of:

  1. Three years

  2. Two years

  3. Five years

  4. One year




Answer: A



Question: 131

At what size and how far above the ground should an opening in a buildings shell be protected?

  1. Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 centimetres) and are lower that 18 feet (5.5 metres) above the ground.

  2. Reinforce or secure any openings in the building shell that measure more than 100 square inches and are lower that 18 feet above the ground.

  3. Reinforce or secure any openings in the building shell that measure more than 80 square inches and are lower that 18 feet (5.5 metres) above the ground.

  4. Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 centimetres) and are lower that 20 feet (6 metres) above the ground.




Answer: A



Question: 132


How many subjects should a single post order cover?

  1. Three

  2. Two

  3. One




Answer: C



Question: 133


Searches made during work hours as a result of a bomb threat call should be made by

  1. Employees familiar with the work area where the bomb is reportedly located

  2. The fire department

  3. The local police department

  4. The Department of Army personnel




Answer: A



Question: 134


What are the three goals of preemployment interviews?

  1. Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Allow transfer of missing information from the applicant to the employer Permit an assessment of the candidate

  2. Candidate selection Allow transfer of missing information from the applicant to the employer Permit an assessment of the candidate

  3. Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Verification of credentials Permit an assessment of the candidate

  4. Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Allow transfer of missing information from the applicant to the employer Exam Job History




Answer: A



Question: 135

What is CPTED?

  1. CPTED, or crime prevention through environmental design is the design or redesign of a venue to maximise access to a site

  2. Physical Barriers on a site

  3. Electronic, Physical and Procedural designs

  4. CPTED, or crime prevention through environmental design is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, or procedural means.




Answer: D



Question: 136


When is containment a good strategy?

  1. When theft is the adversary’s goal. Containment involves preventing the adversary from leaving the site with stolen items.

  2. When assisted by Law Enforcement

  3. When access to firearms is available

  4. When there is company fraud or embezzlement




Answer: A



Question: 137


Who should be assigned the role of an organisations emergency coordinator?

  1. Someone regularly responsible for handling emergencies, such as the head of security or engineering.

  2. Someone regularly responsible for handling emergencies, such as the Business Continuity Manager.

  3. Someone regularly responsible for handling emergencies, such as the head of crisis management

  4. Someone regularly responsible for handling emergencies, such as the COO.




Answer: A



Question: 138


What are the three main limitations of financial statement analysis?

  1. It doesn’t consider changes in market conditions All organisations operate in similar markets Financial reports must be accurate for financial ratios to have meaning

  2. It doesn’t consider changes in market conditions All organisations operate differently and target different markets Financial reports must be accurate for financial ratios to have meaning

  3. It considers changes in market conditions All organisations operate differently and target different markets Financial reports must be accurate for financial ratios to have meaning

  4. It considers changes in market conditions All organisations operate in similar markets Financial reports must be accurate for financial ratios to have meaning




Answer: B



Question: 139

What is the underlying equation of the balance sheet?

  1. Assets = liabilities + stock

  2. Assets = liabilities + shareholder equity

  3. Assets = liabilities + stock cost

  4. Assets = liabilities + shareholder equity + RSU cost




Answer: B



Question: 140


One of the following is not prohibited by the Federal Civil Rights Act during an investigation:

  1. Asking questions about prior convictions

  2. Directing inquiry into areas of religion or sex for discriminatory purposes

  3. Directing inquiry into areas of race or color for discriminatory purposes

  4. Asking questions about prior arrests




Answer: A



Question: 141


What are the five pillars of ISO standards?

  1. Equal footing of members Market need Consensus Voluntary participation and application Worldwide applicability

  2. Equal footing of members Direction of Market Consensus Voluntary participation and application Worldwide applicability

  3. Equal footing of members Direction of Market Global alignment Voluntary participation and application Worldwide applicability

  4. Equal footing of members Direction of Market Economic Need Voluntary participation and application Worldwide applicability




Answer: A



Question: 142


Wired glass is intended to provide resistance to

  1. Knives and hammers

  2. Shattering and fragmentation

  3. Bullets or other high-energy missiles

  4. Fire




Answer: A



Question: 143


What departments are typically involved in preemployment background screening?

  1. Human resources Security Business units Legal

  2. Finance Security Business units Legal

  3. Human resources Security Vendor manager Legal

  4. Business Continuity Security Business units Legal




Answer: A



Question: 144


What is sometimes referred to as the private sector version of emergency management?

  1. Business continuity

  2. Resilience

  3. Disaster Recovery

  4. Emergency Protocol




Answer: A



Question: 145


What should be the primary basis for camera selection?

  1. The sensitivity required for a full video output signal under optimal conditions

  2. Location

  3. Site Selection and Cost accrued

  4. The sensitivity required for a full video output signal in the lighting environment in the area to be assessed




Answer: D



Question: 146


What three factors are driving the growth of private policing?

  1. Economic and operational issues (Fear of) crime and violence Order maintenance

  2. Economic and operational issues (Fear of) crime and violence Cost replacement

  3. Economic and operational issues Access to firearms Order maintenance

  4. Legal and Security issues (Fear of) crime and violence Order maintenance




Answer: A



Question: 147


What are the four key challenges to watch for when operating within a joint task force?

  1. Parochialism Protection of sensitive information Data management Reporting chains

  2. Jurisdiction Protection of sensitive information Data management Reporting chains

  3. Parochialism GDPR Data management Reporting chains

  4. Data Sources Chain security Data management Reporting chains



Answer: A



Question: 148


Who should make up the investigative team for an undercover investigation?

  1. A corporate decision maker An HR representative A corporate security professional An attorney familiar with employment law

  2. CISO/COO An HR representative A corporate security professional An attorney familiar with employment law

  3. A corporate decision maker An LE representative A corporate security professional An attorney familiar with employment law

  4. LE Rep, CISO, & CFO An HR representative A corporate security professional An attorney familiar with employment law




Answer: A



Question: 149


What are the three force multipliers in investigations?

  1. Online information sources (e.g. commercial databases) Liaison (e.g. joint task forces) Intelligence information (e.g. informants)

  2. Personnel Processes Intelligence information

  3. Personnel Processes Protocols

  4. Personnel Processes Liaison




Answer: A



Question: 150


What is the rule of thumb for allocating for spare parts purchases in a budget?

  1. About 5 percent of the capital cost of equipment for a location should be allocated each year for spare parts

  2. About 6 percent of the capital cost of equipment for a location should be allocated each year for spare parts

  3. About 7 percent of the capital cost of equipment for a location should be allocated each year for spare parts

  4. About 9 percent of the capital cost of equipment for a location should be allocated each year for spare parts




Answer: A



Question: 151


What is unity of command?

  1. An individual should only report to only one supervisor

  2. An individual can report to more than one supervisor

  3. An individual should not only report to only one supervisor

  4. An individual can report to multiple leads if the operation demands




Answer: A


Question: 152


Assets protection is increasingly based on what principle?

  1. Risk management.

  2. Insurance Cost

  3. Legal requirement

  4. Cost of replacement




Answer: A



Question: 153


What is OPSEC?

  1. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect critical information. It responds to the fact that small bits of information from different sources can be combined to reveal sensitive information

  2. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect personal identifiable information. It responds to the fact that small bits of information from different sources can be combined to reveal sensitive information

  3. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect business specific information that relates directly to the company. It responds to the fact that small bits of information from different sources can be combined to reveal sensitive information

  4. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect critical government information. It specifically refers to national level information and intelligence and how it should be stored, shared and destroyed




Answer: A



Question: 154


Which kind of investigations cannot be done without police assistance?

  1. Ones involving illegal drugs

  2. Ones involving minors

  3. Ones involving union activity

  4. Ones involving multi-jurisdictional activities




Answer: A



Question: 155


What is the most fundamental form of communication in undercover assignments?

  1. Written reports

  2. Telephone Reports

  3. Email

  4. Verbal Brief



Answer: A



Question: 156


In executive protection (EP), what is an advance?

  1. The process of researching a destination before the principal arrives

  2. Moving vehicles forward

  3. Responding to an active threat

  4. Protecting the client from live fire




Answer: A



Question: 157


What are the five basic functions of management?

  1. Planning Organisation Delegating Coordinating Controlling

  2. Planning Organisation Directing Coordinating Referral

  3. Planning Hiring Directing Coordinating Controlling

  4. Planning Organisation Directing Coordinating Controlling




Answer: D



Question: 158


The Law of Torts deals with

  1. Intentional acts and negligent acts

  2. Negligence and inadvertent conduct that cause damage or injury

  3. Trademark infringement

  4. Torts against persons and torts against property




Answer: A



Question: 159


What is colour rendition?

  1. The ability of a lamp to identify colours seen in an object

  2. The ability of a lamp to record the colours seen in an object

  3. The ability of a lamp to faithfully reproduce the colours seen in an object

  4. The ability of a lamp to minimise and reduce the colours seen in an object




Answer: C



Question: 160


Unclassified material should be marked:

  1. With no marking

  2. "Unclassified" at the top of the page

  3. "Unclassified" at the top and bottom of the page

  4. "Unclassified" at the bottom of the page




Answer: A



Question: 161


When should an undercover investigation be used?

  1. An undercover investigation is appropriate only when no other alternatives are available and the company can reasonably expect a significant return on investment

  2. When there is a suspicion of drug dealing

  3. An undercover investigation is appropriate when law enforcement direct

  4. When there is company fraud or embezzlement




Answer: A



Question: 162


What is the chain of action that must occur if a principal is attacked?

  1. Arm’s reach (immobilize attacker if within arm’s reach, otherwise cover the principal) Sound off (shout the weapon displayed and the direction, in relation to the principal, from which it is coming) Cover Evacuate

  2. Protect the client from live fire

  3. Move to vehicles

  4. Contact Law Enforcement for assistance




Answer: A



Question: 163


What are the five forces shaping assets protection globally?

  1. Collaboration in Systems Globalisation in business Standards and regulation Convergence of security solutions Homeland security and international security environment

  2. Visualisation and Connectivity Globalisation in business Standards and regulation Convergence of security solutions Homeland security and international security environment

  3. Technology and touch Globalisation in business Standards and regulation Convergence of security solutions Homeland security and international security environment

  4. Emergency Management Standards and regulation Convergence of security solutions Homeland security and international security environment




Answer: C



Question: 164


Which two earnings C related ratios are commonly examined in financial analysis?

  1. Earnings per share = net income/total shares Price to earnings = price per share/earnings per share

  2. Earnings per share = net assets/total shares Price to earnings = price per share/earnings per share

  3. Earnings per share = net income/total shares Price to earnings = price per share/earnings after sales

  4. Earnings per share = net income/total shares Price to earnings = price per share/earnings per quarter




Answer: A



Question: 165


What are the most challenging problems in international investigations?

  1. Cultural differences create challenges in international investigations

  2. Conflicting legal obligations from multi-jurisdictional locations

  3. Data Protection and GDPR obligations

  4. Identifying a single mechanism for the sharing of operational information




Answer: A



Question: 166


Who should be made aware of the existence of an undercover investigation?

  1. Only those with an absolute need to know

  2. CISO, CFO & HR

  3. CISO, CFO, HR, and Legal only

  4. Law Enforcement




Answer: A



Question: 167


At a minimum, who should be part of the workplace violence incident management team (IMT)?

  1. A senior management representative A senior HR manager A senior security manager A legal representative familiar with labour and employment law

  2. A senior management representative A senior HR manager The CISO A legal representative familiar with labour and employment law

  3. A LE representative A senior HR manager A senior security manager A legal representative familiar with labour and employment law

  4. A union representative A senior HR manager A senior security manager A legal representative familiar with labour and employment law




Answer: A



Question: 168


What is the most important consideration when a security person deals with a disturbed person?

  1. Bringing the person into custody and eliminating immediate danger

  2. Evacuating the area

  3. Contacting Law Enforcement

  4. Placing the site into Lockdown status




Answer: A



Question: 169


What is a Patent?

  1. A Patent is a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.

  2. Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.

  3. Legal protection of the expression of ideas in literary, artistic, and musical works.

  4. A Patent is a the hereditary right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.




Answer: A



Question: 170


Why should colour be used sparingly in graphical alarm displays?

  1. Because 10 percent of the population has some form of colour blindness

  2. Because 5 percent of the population has some form of colour blindness

  3. Because 15 percent of the population has some form of colour blindness

  4. Because 13 percent of the population has some form of colour blindness




Answer: A



Question: 171


According to Peter Drucker, what is the most crucial question in defining business purpose and mission?

  1. Who is the customer?

  2. What is the goal?

  3. Who is responsible?

  4. What is the product?




Answer: A



Question: 172


What four situations do workplace misconduct investigations typically address?

  1. Conflict of interest Corporate resource abuse/theft Workplace violence Substance abuse

  2. Conflict of interest Sexual Assault Workplace violence Substance abuse

  3. Defamation Corporate resource abuse/theft Workplace violence Substance abuse

  4. Embezzlement Corporate resource abuse/theft Workplace violence Substance abuse



Answer: A



Question: 173


What are the three basic stages of addiction?

  1. Increased tolerance to the drug Increased rationalization and lying Obsession with the substance

  2. Anger Uncontrollable drowsiness

  3. Impaired reflexes Slurred speech Detached interest

  4. Hunger and thirst Slurred speech Uncontrollable drowsiness




Answer: A



Question: 174


What kinds of companies are particularly vulnerable to counterfeiting and piracy?

  1. Start-ups Early stage firms Small and medium size companies that are rich in intangible assets

  2. Start-ups Pre IPO Small and medium size companies that are rich in intangible assets

  3. Start-ups Early stage firms Tech Firms

  4. Start-ups & Financial Institutions Tech Firms Small and medium size companies that are rich in intangible assets




Answer: A



Question: 175


What is the effective range of MANPADS?

  1. 1 to 3.5 kilometres (0.06 to 2.2 miles)

  2. 1 to 4.5 kilometres (0.06 to 2.8 miles)

  3. 1 to 5.5 kilometres (0.06 to 4 miles)

  4. 1 to 6 kilometres (0.06 to 5 miles)




Answer: A



Question: 176


What is a primary benefit of zero-based budgeting?

  1. Zero based budgeting may force managers to consider alternative ways of getting the job done

  2. Zero based budgeting may force managers to consider seeking alternate funding

  3. Zero based budgeting may force managers to request additional supports

  4. Zero based budgeting may force managers to consider streamlining the operation




Answer: A



Question: 177


What is the best source of a protection dog?

  1. A reputable professional breeder.

  2. Through ASIS programs

  3. Through online adverts

  4. Through personal referral




Answer: A



Question: 178


A capacitance sensor is an electric condenser that radiates

  1. Energy

  2. Heat

  3. Light

  4. Sound




Answer: A



Question: 179


Which is the most important type of screening investigation process in a corporate organization

  1. Data security

  2. Theft

  3. Background

  4. Security violation




Answer: A



Question: 180


What is the main potential problem in an undercover investigation?

  1. The possibility that the investigation will be exposed or compromised

  2. Discovery and assault

  3. Clear reporting chains

  4. Cost involved




Answer: A



Question: 181


On what should the decision of whether to arm an officer be based?

  1. Budgeting and Training

  2. Whether there is greater danger to life safety without a weapon Whether the officer may reasonably be expected to use fatal force

  3. Local Legislation and availability of firearms

  4. Availability of competent trained personnel



Answer: B



Question: 182


What elements constitute the Investigation lifecycle?

  1. Initiation Investigation Reporting & Results

  2. Incident Report Investigation Reporting & Results

  3. Analysis Investigation Reporting & Results

  4. Initiation Investigation Determination




Answer: A



Question: 183


Inquiries about an investigation can be connected to the investigative results by means of

  1. Ordering

  2. Grouping

  3. Classification

  4. Indexing




Answer: A



Question: 184


The term for a strike that occurs when management and unions fail to negotiate an agreement on benefits is

  1. Unfair labour practice

  2. Wildcat

  3. Right to Work

  4. Economic




Answer: A



Question: 185


Who should make up the project management team for an undercover investigation?

  1. Undercover investigator Project manager Client representative Corporate attorney Law enforcement representative (if necessary)

  2. Undercover investigator HR manager Security representative Corporate attorney Law enforcement representative (if necessary)

  3. Senior Company Rep HR manager Security representative Corporate attorney Law enforcement representative (if necessary)

  4. Union Rep HR manager Security representative Corporate attorney Law enforcement representative (if necessary)




Answer: A


Question: 186


What is the operating principle of ISO’s management systems standards?

  1. The Plan-Do-Check-Act cycle

  2. Direction and Coordination

  3. Organisational Demand

  4. International alignment




Answer: A



Question: 187


What two values describe sensor effectiveness?

  1. Location of Sensor Lighting

  2. Probability of detection Lighting

  3. Location of Sensor Confidence level

  4. Probability of detection Confidence level




Answer: D



Question: 188


What is a Copyright?

  1. Legal protection of the expression of ideas in literary, artistic, and musical works.

  2. Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source.

  3. Legal protection for a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time.

  4. Legal protection of the expression of ideas in corporate law and policy.




Answer: A



Question: 189


What are the three primary objectives of emergency management?

  1. Minimize the probability of an emergency Mitigate the impact of the emergency Recover from the emergency and resume normal operations

  2. Minimize the probability of an emergency Mitigate the impact of the emergency Recover from the emergency and prepare the communications plan

  3. Minimize the probability of a reoccurrence Mitigate the impact of the emergency Recover from the emergency and resume normal operations

  4. Minimize the probability of an emergency Mitigate the cost of the emergency Recover from the emergency and resume normal operations




Answer: A


Question: 190


What is good practice to make sure a guest wears a badge while on the premises?

  1. Explain to the person that the badge permits immediate recognition by and assistance from employees

  2. Identification of approved guests and employees

  3. Explain to the person that the badge must be worn otherwise they will have to leave the site

  4. Explain to the person that the badge is a legal requirement




Answer: A



Question: 191


How is the response function of a physical protection system (PPS) measured

  1. The response function of a PPS is measured by the time between receipt of communication of adversary action and the arrest of the adversary

  2. The response function of a PPS is measured by the time between the alarm time and incident closure

  3. The response function of a PPS is measured by the time between receipt of communication of adversary action and the arrival of law enforcement

  4. The response function of a PPS is measured by the time between receipt of communication of adversary action and the interruption of the adversary action




Answer: D



Question: 192


What is the biggest challenge in investigating workplace misconduct issues?

  1. Getting employees to report wrongdoing

  2. GDPR Alignment

  3. Legal Oversight

  4. Coordinate with Law Enforcement and Legal Counsel




Answer: A



Question: 193


How does the progression of interviews differ between regular investigations and undercover investigations?

  1. In regular investigations, the interview process closes in on the perpetrators over time. Undercover investigations begin with those most involved and work towards those less involved

  2. Undercover investigations are not legally covered outside the company

  3. Undercover investigations cannot be used to reclaim company assets

  4. In regular investigations LE assistance may be necessary. In undercover investigations LE assistance is prohibited unless approved by Legal




Answer: A



Question: 194

What is the least understood and most underused form of investigation?

  1. Undercover investigations

  2. Fraud Investigations

  3. Assault investigations

  4. Personal Injury




Answer: A



Question: 195


What are the effects of large doses of cocaine?

  1. Bizarre behaviour Tremors Vertigo Muscle twitches Paranoia Toxic reaction

  2. Craving Loss of control Physical dependence Tolerance

  3. Impaired reflexes Slurred speech Uncontrollable drowsiness

  4. Impaired reflexes Anger Uncontrollable drowsiness




Answer: A



Question: 196


What are general orders?

  1. Guidelines for Operations

  2. Canons, or bodies of principles, for protection officers (e.g. No smoking on duty)

  3. Suggested Guidelines for protection officers

  4. Recommended guidelines and principles, for protection officers (e.g. No smoking on duty)




Answer: B



Question: 197


What is ‘working the principal’?

  1. The choreography used by an executive protection specialist to physically move about with the principal.

  2. Moving vehicles forward

  3. Responding to an active threat

  4. Protecting the client from live fire




Answer: A



Question: 198


What are the four symptoms of alcohol dependence?

  1. Craving Loss of control Physical dependence Tolerance

  2. Impaired reflexes Slurred speech Uncontrollable drowsiness

  3. Impaired reflexes Anger Uncontrollable drowsiness

  4. Craving Loss of control Anger Tolerance



Answer: A



Question: 199


What are a company’s top two valuable resources?

  1. #1 C employees #2 C assets

  2. #1 C employees #2 C corporate knowledge

  3. #1 C C Level Execs #2 C corporate knowledge

  4. #1 C employees #2 C Profit & Loss statement




Answer: B



Question: 200


Which of the following substances would induce poor perception of time and distance

  1. Hallucinogens

  2. Stimulants

  3. Narcotics

  4. Depressants




Answer: A



Question: 201


For effective bulk explosive detection, how often must a person be screened by low dose backscatter x-ray devices?

  1. Twice

  2. Three times

  3. Four Times

  4. Once




Answer: A



Question: 202


What are the two most popular breeds of protection dogs in the United States?

  1. German Shepherd Doberman Pincher

  2. German Shepherd Alsation

  3. German Shepherd Husky

  4. Labrador Cross Doberman Pincher




Answer: A



Question: 203

What are the five qualities that characterise an effective, reliable investigation?

  1. Objectivity Thoroughness Relevance Accuracy Timeliness

  2. Objectivity Communication Relevance Accuracy Timeliness

  3. Objectivity Thoroughness Relevance Experience Timeliness

  4. Objectivity Thoroughness Analysis Accuracy Timeliness




Answer: A



Question: 204


What four major areas does assets protection cover in the telecommunications sector?

  1. Information security Network/computer security Fraud prevention Physical security

  2. Information security Network/computer security Business Continuity Physical security

  3. Information security Emergency Management Fraud prevention Physical security

  4. Information security Network/computer security Fraud prevention Physical Intervention




Answer: A



Question: 205


What should every job offer be based on?

  1. Satisfactory completion of preemployment background checks

  2. Personal recommendation

  3. Medical screening

  4. Completion of training program




Answer: A



Question: 206


What are the two key measurements for the effectiveness of the detection function of a physical protection system? (PPS)

  1. Probability of sensing adversary action and Implementation of effective countermeasures

  2. Target identification and Isolation of the incident

  3. Implementation of countermeasures Evaluation of effectiveness

  4. Probability of sensing adversary action, Time required for reporting and assessing the alarm.




Answer: A



Question: 207


In setting up a proprietary investigative unit, the most important aspect to consider is the:

  1. Number of personnel

  2. Budgeting for staff

  3. Selection of professional personnel

  4. Specialized training of the applicant



Answer: A



Question: 208


What is the process by which an employer verifies the experience and qualifications presented by a job candidate?

  1. Credentialing

  2. Background Check

  3. Screening

  4. Verification




Answer: A



Question: 209


What are the two basic analytical approaches to a risk assessment?

  1. Compliance based and Descriptive

  2. Quantitively and Qualative

  3. Metrics and Graphical

  4. Compliance based Performance based




Answer: D



Question: 210


What are the four approaches to situational crime prevention?

  1. Increase the effort required (e.g. target hardening, access control), Increased artificial lighting Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting)

  2. Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting)

  3. Increase the effort required (e.g. target hardening, access control), Investment in CPTED Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting)

  4. Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling)




Answer: B



Question: 211


What is defensible space?

  1. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment that would encourage residents to proactively report all security incidents and events in the local environment

  2. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical

    construction of a residential environment could elicit behaviour from residents that would contribute significantly to their safety. It directly leads to increased costs associated with security services

  3. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment would prevent residents from reporting security incidents or events

  4. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behaviour from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance.




Answer: D



Question: 212


What is the typical initiation event in a private sector incident investigation?

  1. An incident report

  2. Alarm activation

  3. Law Enforcement report

  4. Confidential Informant




Answer: A



Question: 213


What five guidelines should be observed for workplace drug purchases that are part of an investigation?

  1. Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use

  2. Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases on company time Record all transactions

  3. Qualify the dealer Coordinate with Legal Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use

  4. Qualify the dealer Coordinate with Legal & HR Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use




Answer: A



Question: 214


One of the following is not prohibited by the Federal Civil Rights Act during an investigation

  1. All

  2. A record

  3. A custodian of record

  4. A public official




Answer: A



Question: 215

Who may edit officers incident entries in a database log?

  1. CISO, CFO, HR, and Legal

  2. Security Officers

  3. Higher level supervisors

  4. Nobody




Answer: C



Question: 216


How does situational crime prevention differ from CPTED and defensible space?

  1. Situational crime prevention seeks to reduce crime opportunities in public and private environments where applicable

  2. Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, not just in the built environment.

  3. Situational crime prevention seeks to reduce crime opportunities through integrating public and private enterprises

  4. Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, in tandem with legal guidelines and oversight




Answer: B



Question: 217


In what two ways can an undercover operative be placed?

  1. Cold Hire (operative applies for a job just like any other applicant) Controlled Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)

  2. Cold Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)

  3. Immediate Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)

  4. Open Hire (operative applies for a job just like any other applicant) Closed Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed)




Answer: A



Question: 218


Workplace crime is the function of which three fundamental elements?

  1. Quality of hires Environment in which staff is placed Quality of supervision over environment and staff

  2. Opportunity, Motive, Ability

  3. Opportunity, Motive and quality of personnel

  4. Quality of hires Motivation Quality of supervision over environment and staff




Answer: A



Question: 219

Why might lower-level managers more readily accept a bottom-up budget?

  1. To allow for future operational increases

  2. Because it is a CFO direction

  3. Because they had a role in developing it

  4. To ensure alignment




Answer: C



Question: 220


What are the three main tools of an investigator?

  1. Information Interrogation Instrumentation

  2. Information Analysis Instrumentation

  3. Information Intelligence Instrumentation

  4. Analysis Intelligence Instrumentation




Answer: A



Question: 221


What is the goal of a vulnerability assessment?

  1. To identify physical protection system (PPS) components in the functional areas of site security and to gather data to estimate site performance against particular threats.

  2. To identify physical protection system (PPS) components in the functional areas of entry and access and to gather data to estimate their performance against particular threats.

  3. To identify physical protection system (PPS) components in the functional areas of detection, delay and response and to gather data to estimate their performance against particular threats.

  4. To identify physical protection system (PPS) components in the functional areas of emergency management and business continuity and to gather data to estimate their performance against particular threats.




Answer: C



Question: 222


What is the difference between asset protection and security?

  1. Assets protection includes all security functions, as well as related functions such as investigations, legal oversight, risk management, safety, compliance, and emergency management.

  2. Assets protection includes only physical security related functions.

  3. Assets protection includes all security functions, as well as related functions such as investigations, risk management, safety, human resources, compliance, and emergency management.

  4. Assets protection includes all security functions, as well as related functions such as investigations, risk management, safety, compliance, and emergency management.




Answer: D



Question: 223

With respect to span of control, the greater the degree of sophistication of interaction between supervisors and subordinates, the

  1. Broader the optimum span of control

  2. More difficult it is to identify the optimum span of control

  3. Narrower the optimum span of control

  4. More options there are in choosing the optimum span of control




Answer: A



Question: 224


What type of extremists pose the most dangerous threat to the world today?

  1. Global jihadists

  2. Single ideology extremists

  3. Zero day terrorists

  4. Independence Extremists




Answer: A