ASIS-APP Dumps ASIS-APP Braindumps ASIS-APP Real Questions ASIS-APP Practice Test ASIS-APP Actual Questions ASIS ASIS-APP Associate Protection Professional https://killexams.com/pass4sure/exam-detail/ASIS-APP Question: 1 What is the ‘span of control’ principle? A. A single person can supervise only a limited number of staff members effectively (generally up to 6) B. A single person can supervise only a limited number of staff members effectively (generally up to 8) C. A single person can supervise only a limited number of staff members effectively (generally up to 12) D. A single person can supervise only a limited number of staff members effectively (generally up to 10) Answer: D Question: 2 What is the design C basis threat? A. The cost incurred for the utility being protected. It is used to help design and evaluate a physical protection system (PPS) B. The adversary against which the utility must be insured against. It is used to help design and evaluate a physical protection system (PPS) by the CISO C. The cost incurred for the person being protected. D. The adversary against which the utility must be protected. It is used to help design and evaluate a physical protection system (PPS) Answer: D Question: 3 What is a mutual aid association? A. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies. B. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies on a cost basis. C. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies at cost for the duration of the arrangement D. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other by providing materials, equipment, and personnel for disaster control during emergencies. It is subject to the limit of the emergency. Answer: A Question: 4 Which of the following is an advantage of having investigation conducted by in-house security staff? A. In-house staff has better grasp as to objective of the investigation B. Cheaper as a general rule, depending on number of check being done C. In-house staff has better sources of information D. In-house staff is better trained Answer: A Question: 5 What is a Business impact analysis (BIA)? A. A BIA is a tool used to: Identify an entity’s critical functions Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop and prioritize recovery strategies B. A BIA is a tool used to: Identify an entity’s communication structure Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop and prioritize recovery strategies C. A BIA is a tool used to: Identify an entity’s critical functions Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop the cost associated with the emergency D. A BIA is a tool used to: Identify key stakeholders Assess the impact of a disaster or emergency on those functions over time Determine the other elements of the business on which those critical functions depend Help develop and prioritize recovery strategies Answer: A Question: 6 What are the three contributors to cost of replacement? A. Repair and Replacement cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional B. Insurance Cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional C. Upgrade Cost including replacement fee Freight and Shipping charges Make C ready or preparation cost to install it or make it functional D. Purchase price or manufacturing cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional Answer: D Question: 7 What is the ‘necessary human being’ concept? A. The particular characteristics and reactions required at a security post necessitate human capabilities B. Dependant characteristics of a human operating a security system C. The particular characteristics and reactions required at a security post that do not necessitate human capabilities D. The particular characteristics and reactions required at a security post that can be recovered and upgraded by mechanical means Answer: A Question: 8 What are the four approaches to terrorism analysis? A. Multicausal Political Organisational Psychological B. Geopolitical Political Organisational Psychological C. Historical Political Organisational Psychological D. Financial Political Organisational Psychological Answer: A Question: 9 What are the four types of emergency drill formats? A. Tabletop exercise Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies B. Tabletop exercise Evacuation/shelter in place drill Comms walkthrough Full exercise with outside response agencies C. Lead exercise Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies D. Tabletop exercise with Law Enforcement Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies Answer: A Question: 10 In investigations, what’s the difference between an analysis diagram and a horizontal diagram? A. An analysis diagram links details regarding persons, events, etc during an investigation. A horizontal diagram compares different periods of a company’s financial statement that will be beneficial during a fraud investigation B. An analysis diagram links details regarding property and events A horizontal diagram compares different periods of a company’s security statement that will be beneficial during a fraud investigation C. An analysis diagram links details regarding timeline, incidents and events, etc during an investigation. A horizontal diagram compares different sections of a company’s annual loss statement that will be beneficial during a fraud investigation D. An analysis diagram links details the reporting chain used during an investigation, that includes the CSO and the COO A horizontal diagram compares different periods of a company’s financial statement that will be beneficial during a fraud investigation Answer: A Question: 11 What are indirect costs to security? A. Harm to Reputation Loss of goodwill Loss of employees Harm to employee morale B. Harm to Reputation Loss of goodwill Loss of employees Insurance Costs C. Increased Alarm Rates Indirect Career Progression Loss of employees Harm to employee morale D. Harm to Reputation Loss of goodwill Loss of contract Harm to Business Answer: A Question: 12 According to Fennelly, what are the three key tools in crime prevention programs? A. Planning Management Cost B. Planning Management Evaluation C. Planning Management Availability D. Planning Management Communication Answer: B Question: 13 Any person may affect an arrest without warrant when he/she A. Has reasonable grounds to believe that an individual has committed a criminal offence and is escaping from and freshly pursued by persons who have lawful authority to arrest that individual B. Has reasonable grounds to believe that the individual will fail to attend court C. Has reasonable grounds to believe that a person has committed an indictable offence D. Finds an individual committing any offence Answer: A Question: 14 What is the formula for lost income cost? A. I = i/365 x P x t, where: I = Income earned I = annual percent loss of return P = Principal amount) in dollars) available for investment t = time (in days) during which P is available for investment B. I = i/365 x P x t, where: I = Income lost I = annual percent rate of return P = Principal amount) in dollars) available for investment t = time (in days) during which P is available for investment C. I = i/365 x P x t, where: I = Income earned I = annual percent rate of return P = Principal amount) in dollars) available for investment t = time (in days) during which P is available for investment D. I = i/365 x P x t, where: I = Income earned I = annual percent rate of return P = Principal amount) in dollars) lost on investment t = time (in days) during which P is available for investment Answer: C Question: 15 Why are emergency management tests and exercises conducted? A. To check workability of the plan To determine levels of staff awareness and training To evaluate emergency communications To identify shortcomings in evacuation procedures B. To check the cost of the plan To determine levels of staff awareness and training To evaluate emergency communications To identify shortcomings in evacuation procedures C. To check workability of the plan To determine levels of compliance To evaluate emergency communications To identify shortcomings in evacuation procedures D. To check workability of the plan To determine levels of staff awareness and training To review communications strategy To identify shortcomings in evacuation procedures Answer: A Question: 16 How do aggressors decide to commit workplace violence? A. Not by ‘snapping’, but through a process of emotional escalation, or, with psychopaths, non-emotional decision making B. Through planned action C. By ‘snapping’ as a result of perceived injustice D. In response to a confirmed slight or ‘wrong’ Answer: A Question: 17 What organisation is the world’s largest developer of international standards? A. ASIS B. WHO C. ISO, the International Organisation for Standardisation D. European Union Answer: C Question: 18 What is the most important relationship for security during a strike? A. The relationship with local law enforcement B. The relationship with unions C. The relationship with HR & Legal D. The relationship between law enforcement and legal Answer: A Question: 19 What are the three primary functions of security lighting? A. Deterrence Life safety Video lighting B. Deterrence Incident Recording Video lighting C. Prevention and Retention Life safety Video lighting D. Incident Management Life safety Video lighting Video lighting Answer: A Question: 20 Who should have access to the emergency telephone numbers of key personnel? A. Staff in control centres Senior personnel with plan implementation responsibilities B. Security personnel in control centres Senior personnel with plan implementation responsibilities C. Staff in control centres Legal personnel with plan implementation responsibilities D. Staff in control centres Emergency Management personnel with plan implementation responsibilities Answer: A Question: 21 What are the two most commonly abused drugs in the workplace? A. #1 Alcohol #2 Marijuana B. #1 Alcohol #2 Nicotine C. #1 Nicotine #2 Marijuana D. #1 Alcohol #2 PCP Answer: A Question: 22 How long do the effects of controlled release OxyContin last? A. 8 to 12 hours B. 10 to 12 hours C. 8 to 14 hours D. 8 to 16 hours Answer: A Question: 23 What are the five phases of an undercover operation? A. Planning and preparation Information gathering C operative placed Verification and analysis C operative removed Discipline and corrective action Prevention and education B. Law Enforcement Engagement Information gathering C operative placed Verification and analysis C operative removed Discipline and corrective action Prevention and education C. Planning and preparation Information gathering C operative placed Verification and analysis C operative removed Legal Action Prevention and education D. Planning and preparation Information gathering C operative placed Verification and analysis C operative removed Discipline and corrective action Law Enforcement engagement Answer: A Question: 24 What are the four stages of an investigative reporting process? A. Initial report Progress report (within 30 days of initial report) Special report Final report B. Initial report Progress report (within 20 days of initial report) Special report Final report C. Initial report Progress report (within 40 days of initial report) Special report Final report D. Initial report Progress report (within 50 days of initial report) Special report Final report Answer: A Question: 25 What is key to a sound back story of an undercover operative? A. Personal details that are not true but are known to the targeted employee, such as schools attended, former workplaces, or previous home neighbourhoods B. Plausible & realistic C. One that is easily remembered D. A detailed history with a verifiable background Answer: A Question: 26 What is the vulnerability assessments team’s primary job as it pertains to a physical protection system (PPS)? A. To determine security system effectiveness. B. To secure a site C. To record system violations D. To determine the alarm response ratio Answer: A Question: 27 What is the best way to prepare for workplace misconduct investigations? A. Coordinate as soon as possible with the HR director and corporate legal counsel because of the possibility of employee legal action B. Source a secure location to conduct interviews C. Review the initiation report D. Coordinate with Law Enforcement and Legal Counsel Answer: A Question: 28 When should a supervisor visit a security post? A. Regularly, in an unscheduled manner B. Once per hour C. Twice per hour D. Six times during 9 hour shift Answer: A Question: 29 What type of specimen is analysed most often in drug tests? A. Urine B. Hair C. Saliva D. Blood Answer: A Question: 30 What are the three standard financial reports? A. Income statement Balance sheet Statement of cash flows B. Income statement Bank statement Statement of cash flows C. Income statement Balance sheet Statement of assets D. Income statement Balance sheet Share value Answer: A Question: 31 How frequently should investigative summaries of undercover operations be produced? A. Typically, summaries are prepared after the operative has completed 10 consecutive days of work B. Typically, summaries are prepared after the operative has completed 20 consecutive days of work C. Typically, summaries are prepared after the operative has completed 30 consecutive days of work D. Typically, summaries are prepared after the operative has completed 25 consecutive days of work Answer: A Question: 32 What does an income statement show? A. Revenue Expenses Statement of Assets B. Revenue Expenses Share value C. Revenue Expenses Closing balance D. Revenue Expenses Net income over a defined period Answer: D Question: 33 What is the current ratio? A. The current ratio is a measure of a company’s ability to cover medium term obligations Current ratio = current assets/current liabilities B. The current ratio is a measure of a company’s ability to cover long term obligations Current ratio = current assets/current liabilities C. The current ratio is a measure of a company’s ability to cover immediate obligations Current ratio = current assets/current liabilities D. The current ratio is a measure of a company’s ability to cover short term obligations Current ratio = current assets/current liabilities Answer: D Question: 34 What are the three general measures to valuing assets? A. Cost Consequence criteria Policy B. Insurance Fees Consequence criteria Policy C. Asset Liability Consequence criteria Policy D. Value of the Assets Consequence criteria Policy Answer: A Question: 35 Selection devices in the personnel selection process used by managers to reduce accept and reject errors include A. Performance-simulation tests, application forms, resume, interviews B. Application form, resume, pencil and paper tests, interviews C. Performance-simulation tests, drug screening, applications form, resume D. Application form, pencil and paper tests, performance-simulation tests, interviews Answer: A Question: 36 What does a cash flow statement show? A. Available funds to the organisation B. How cash inflows and outflows affect an organisation C. Funds due to the organisation D. Available funds allocated for the financial year Answer: B Question: 37 A claimant’s allegation of invasion of privacy would be appropriately supported in a situation where the alleged perpetrator: A. Revealed damaging information from a police file to the claimant’s spouse B. Revealed further details about a matter that was reported in a published biography of the claimant C. Mentioned during a televised interview a rumor about the claimant engaging in criminal activity D. Repeated a story that the claimant was overheard telling in a crowded public place Answer: A Question: 38 Which of the following is not true with regard to door latches? A. Both B and C B. Chain latches are highly recommended as effective security measures C. A dead-bolt latch is very expensive D. A dead-bolt latch increases the security posture of the facility Answer: A Question: 39 What is the overall objective of an investigation? A. A successful outcome or resolution of the case B. To secure a conviction C. To recover stolen items D. To identify those involved in a crime Answer: A Question: 40 What are the three managerial dimensions of assets protection? A. Technical expertise Management ability Communications B. Academic Qualifications Management ability Ability to deal with people C. Technical expertise Operational ability Ability to deal with people D. Technical expertise Management ability Ability to deal with people Answer: D Question: 41 In the development of a security program using the systems approach, the three general elements that must be given consideration are: A. A vulnerability analysis, implementation of countermeasures, and a test of the operating program B. The installation of fencing, locks, and alarms C. Pre-employment screening, policies, and standardized procedure D. A loss prevention program, risk analysis, and recovery documentation Answer: A Question: 42 What system reduces the possibility that a facility badge can be counterfeited, lost, or stolen? A. 62 Bit Encryption B. Proximity Badge C. 32 Bit Encryption D. An exchange badge system Answer: D Question: 43 What is perhaps the best way to achieve funding for an Investigations Unit (IU)? A. Demonstrate how the unit pays for itself B. Provide case statistics C. Direct from Physical Security Budget D. Demonstrate successful case load Answer: A Question: 44 The cardinal rule in management of a transportation concern is that those assigned to line hauling duties must be A. Willing and able to discuss their cargo B. In possession of extra cargo seals C. Capable of lifting more than 50 lbs. D. Of the highest integrity Answer: A Question: 45 How many years of prior work history should a job application ask for? A. At least 7 to 10 years B. At least 7 to 12 years C. At least 7 to 15 years D. At least 12 to 15 years Answer: A Question: 46 What are post orders based on? A. Legal Guidelines B. Standard Operating Procedures C. Client Needs D. Location and hours of work Answer: B Question: 47 Why might companies keep secret the existence of kidnap, ransom, and extortion policies from their personnel? A. To avoid being targeted B. To prevent negative press C. To comply with company legislation D. To ensure alignment Answer: A Question: 48 A well-engineered physical protection system (PPS) exhibits which three characteristics? A. Protection in Depth Minimum consequence of component failure (redundancy) 360 Coverage B. Protection in Depth Minimum consequence of component failure (redundancy) Balanced protection C. Protection in Depth Minimum consequence of component failure (redundancy) Power Redundancy D. Protection in Depth Layered Perimeter Utility Support Answer: B Question: 49 What are the three ways to measure profit margins? A. Gross profit margin = (revenue C cost of goods bought C general and administrative costs)/revenue Operating margin = EBITA (earnings after interest, taxes, and amortization)/ revenue B. Gross profit margin = (revenue C cost of goods bought C general and administrative costs)/revenue Operating margin = EBITA (earnings before interest, taxes, and amortization)/ revenue C. Gross profit margin = (revenue C cost of goods sold C general and administrative costs)/revenue Operating margin = EBITA (earnings before interest, taxes, and amortization)/ revenue D. Gross profit margin = (revenue C cost of goods sold C general and administrative costs)/revenue Operating margin = EBITA (earnings after interest, taxes, and amortization)/ revenue Answer: C Question: 50 According to Oatman, what are the six principles that should guide thinking about executive protection? A. Prevent and avoid danger Realize that anyone can protect anyone Don’t stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on technology B. Prevent and avoid danger Realize that anyone can protect anyone Stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on brains, not on technology C. Prevent and avoid danger Only team members can protect anyone Stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on brains, not on technology D. Prevent and avoid danger Realize that anyone can protect anyone Don’t stop to think Keep clients out of trouble Understand the security vs convenience continuum Rely on brains, not on technology Answer: D Question: 51 What are the four main types of CCTV cameras? A. Standard analog CCD Dome Infrared Thermal B. Standard analog CCD IP Infrared Thermal C. Standard analog CCD Bullet Infrared Thermal D. Standard analog CCD Fixed Infrared Thermal Answer: B Question: 52 How long should a strategic plan look out into the future? A. Three to ten years B. Three to six years C. Three to five years D. Three to seven years Answer: C Question: 53 What is the preferred glass type for mitigating blast forces? A. Laminated glass is preferred for mitigating blast forces B. Sheet Glass C. Plexiglass D. Single reinforced glazing Answer: A Question: 54 What are the four main strategies of second generation CPTED (the four C’s) ? A. Cohesion Capacity threshold (tipping point) Creativity Connectivity B. Cohesion Capacity threshold (tipping point) Communication Connectivity C. Cohesion Capacity threshold (tipping point) Community culture Connectivity D. Cohesion Capacity threshold (tipping point) Collaboration Connectivity Answer: C Question: 55 What are the elements of a systems approach to developing a physical protection system (PPS)? A. Assessment of needs Implementation of countermeasures Evaluation of effectiveness B. Assessment of vulnerability Implementation of countermeasures Evaluation of effectiveness C. Assessment of vulnerability Evaluation of effectiveness and Defence in Depth D. Assessment of needs Implementation of countermeasures Evaluation of effectiveness Answer: B Question: 56 In what situation is protecting investigative information particularly difficult? A. Protecting information can be difficult when working with joint task forces, because each participating agency likely has different policies, definitions, perspectives, and attitudes towards what is sensitive and warrants protection B. Protecting information can be difficult when working with joint task forces, because each participating agency will have different information handling and storage programs C. Protecting information can be difficult when working with joint task forces, because each participating agency likely will be reporting to individual stakeholders none of whom are in the same reporting chain D. Protecting information can be difficult when working with joint task forces, because each participating agency can be subject to competing multi-jurisdictional legal oversight issues Answer: A Question: 57 When is the best time to remove an undercover operative? A. When he or she is named as an offender by co-workers B. Outside of working hours C. On approval from LE D. On approval from HR & Legal Answer: A Question: 58 How should change or corrections be made in officers written log entries? A. Entered in Red Ink and signed by Security Officer & Manager B. Entered in Red Ink C. Entered in Red Ink and signed by Security Officer D. Under a new event number as a separate item Answer: D Question: 59 What is the quick ratio? A. The quick ratio is a measure of an organisations ability to cover current liabilities with current assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/current liabilities B. The quick ratio is a measure of an organisations ability to cover projected liabilities with current assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/projected liabilities C. The quick ratio is a measure of an organisations ability to cover future liabilities with current assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/future liabilities D. The quick ratio is a measure of an organisations ability to cover current liabilities with borrowed assets that be quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/borrowed liabilities Answer: A Question: 60 What kind of legal privilege is typically granted to properly controlled investigative reports? A. Qualified privilege, protecting against defamation suits B. Qualified privilege, Protection against criminal prosecution C. Personal Injury protection, protecting against defamation suits D. Qualified privilege, protection against investigation Answer: A Question: 61 According to the FBI, what are the six steps of protecting a business from espionage? A. Recognise the (insider or outsider) threat Identify and value trade secrets Implement a proactive plan for protecting trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection B. Recognise the (insider or outsider) threat Close Trade secrets Implement a proactive plan for protecting trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection C. Recognise the (insider or outsider) threat Identify and value trade secrets Implement Disaster Recovery Plans Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection D. Recognise the (insider or outsider) threat Define Key Stakeholders Implement a proactive plan for protecting trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on intellectual property protection Answer: A Question: 62 What three questions does a risk assessment attempt to answer? A. What Protocols currently exist? What is the likelihood it would go wrong? What are the consequences? B. What can go wrong? What is the cost associated? What are the consequences? C. What resources are available? What is the likelihood it would go wrong? What are the consequences? D. What can go wrong? What is the likelihood it would go wrong? What are the consequences? Answer: D Question: 63 What are the three types of CPTED solutions? A. Mechanical measures Electronic Lighting and Direction of Flow B. Legal Guidelines Human and organisational measures Natural measures C. Mechanical measures Human and organisational measures Lighting and Direction D. Mechanical measures Human and organisational measures Natural measures Answer: D Question: 64 How many years of experience should a new investigative hire have? A. As a rule of thumb, new hires should have at least two years of experience conducting investigations B. As a rule of thumb, new hires should have at least three years of experience conducting investigations C. As a rule of thumb, new hires should have at least four years of experience conducting investigations D. As a rule of thumb, new hires should have at least five years of experience conducting investigations Answer: A Question: 65 What is the best way to recruit a good candidate for a job? A. Internal recommendations B. Open competitions C. Direct Appointments D. Closed competitions Answer: A Question: 66 What three factors should determine selection of a CCTV camera? A. Sensitivity Degradation Features B. Sensitivity Resolution Features C. Sensitivity Degradation Timing D. Resolution Degradation Timing Answer: B Question: 67 What does a balance sheet show? A. A summary of an organisations investing and financing B. A summary of an organisations profits and loss C. A summary of an organisations share value D. A summary of an organisations RSU schedule Answer: A Question: 68 What are the three levels of assessment for violent risk among known subjects? A. Initial Threshold Comprehensive B. Initial Threshold Violent C. Initial Assessment Comprehensive D. Immediate Threshold Comprehensive Answer: A Question: 69 In Pastor’s public/private, substitute/supplement model of policing, which cell represents the rarest scenario? A. Public/Private B. Private/Industrial C. Public/Substitute D. Private/Substitute Answer: C Question: 70 What are the main functions of a physical protection system (PPS)? A. The primary functions are detection, delay, and record. Deterrence is a secondary function. B. The primary functions are direct, delay, and response. Deterrence is a secondary function. C. The primary functions are determine, delay, and response. Deterrence is a secondary function. D. The primary functions are detection, delay, and response. Deterrence is a secondary function. Answer: D Question: 71 What is ‘minimum resolvable temperature’? A. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder, activity and the background. B. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between staged sensors C. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder and the site environment. D. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an intruder and the background. Answer: D Question: 72 What are the two general types of insurance? A. Personal Accidental B. Property Liability C. Property Travel D. Property Accidental Answer: B Question: 73 What are the three primary functions of a physical protection system (PPS)? A. Detection Delay Response B. Assess Report Response C. Record Deny Respond D. Identify Deny Respond Answer: A Question: 74 Where are executives most vulnerable to attack? A. At home B. At work C. In transit D. While exercising Answer: A Question: 75 What theory underpins situational crime prevention? A. Motive and Opportunity B. Geo political theory C. Criminal Law D. Rational choice theory Answer: D Question: 76 For insurance against business interruption, what are the two types of valuation methods? A. Perceived loss sustained Valued loss B. Actual loss sustained Valued loss C. Actual loss sustained Insured loss sustained D. Actual loss sustained Incurred replacement cost Answer: B Question: 77 What are three major pitfalls of using online information sources for investigations? A. Going off on a tangent/spending too much time online Assuming online information is credible without exploring further Searching online sources may not be best use of an investigator’s time B. Reliability Accuracy Safety C. Robustness Legal Considerations Search Parameters D. Reliability Accuracy Security of source Answer: A Question: 78 What are the five basic coverages of crime insurance policy? A. Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Harassment Bond B. Employee Injury bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Depositors forgery coverage C. Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Depositors forgery coverage D. Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage outside the premises Money order and counterfeit paper currency coverage Theft and forgery coverage Answer: C Question: 79 What is generally the most practical approach to budget development? A. A combination of top down and bottom up processes and mutual forecasting B. A top down approach C. A bottom up approach D. A combination of top down and bottom up processes Answer: D Question: 80 Which of the following is not generally true regarding money safes? A. Both C & D B. Those manufactured prior to 1960 have round doors C. They provide good protection against fire D. They always have wheels Answer: A Question: 81 What is the biggest vulnerability of a loop system? A. All the detectors in an area could be disabled by interrupting the loop at the proper location B. Physical Intervention C. Power interruption D. Detectors not being recorded on a system Answer: A Question: 82 What are the three ways of verifying personnel entry? A. Who you are (role) What you know (PIN, password) What you have (badge) B. Who you are (role) What you know (PIN, password) What you are (biometrics) C. What you have (credential) What you know (PIN, password) What you are (biometrics) D. What you have (credential) What you carry (YubiKey) What you are (biometrics) Answer: C Question: 83 During a trip with a principle, what are the three key concepts for an executive protection (EP) specialist to remember? A. Keep a low profile Stay away from problem areas and situations Know what to do if trouble arises B. Keep a low profile Stay away from problem areas and situations Contact Law Enforcement C. Keep a low profile Stay away from problem areas and situations Secure transport D. Keep a low profile Define scope of ops Know what to do if trouble arises Answer: A Question: 84 In its basic sense, the investigative process reflects A. A simple statement of all the abstracts encountered B. The mindset of the investigator C. Precise controlled examination D. Absolute goal-oriented inquiry Answer: A Question: 85 Who is the person responsible for maintaining and archiving closed case files, including all notes, reports and summaries? A. The custodian of record B. The security manager C. The HR Rep D. The Project Manager Answer: A Question: 86 What are the three most common methods of training protection dogs? A. Positive reinforcement (praise) Compulsion (negative corrections) Inducement (toys, foods) B. Positive reinforcement (praise) Compulsion (negative corrections) Punishment (corrections) C. Positive reinforcement (praise) Communication (talking) Inducement (toys, foods) D. Repeated Performance (repeat exercise) Compulsion (negative corrections) Inducement (toys, foods) Answer: A Question: 87 What are the five Ds of security? A. Divide Deny Detect Delay Destroy B. Defend Deny Detect Delay Destroy C. Define Deny Detect Delay Destroy D. Deter Deny Detect Delay Destroy Answer: D Question: 88 Field welds and brazing on factory boxes, enclosures, and conduits should be coated with what? A. Cold galvanized paint containing at least 95 percent zinc by weight B. Cold galvanized paint containing at least 75 percent zinc by weight C. Cold galvanized paint containing at least 65 percent zinc by weight D. Cold galvanized paint containing at least 55 percent zinc by weight Answer: A Question: 89 What is the ‘broken windows’ theory? A. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because no capable guardian (i.e. security presence) is observed. B. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of the drop in value of a site C. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to the impression of higher costs associated with security services D. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti and trash, unattended or unrepaired can lead to a reduction of Law Enforcement patrolling and response to a location Answer: A Question: 90 What is a Trademark A. Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source. B. Legal protection for a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time. C. Legal protection of the expression of ideas in corporate law and policy. D. Legal protection of the expression of ideas in literary, artistic, and musical works. Answer: A Question: 91 Who should be responsible for shutting down equipment in an emergency? A. Those already familiar with the process. B. Senior Engineer on Duty C. All Security Personnel D. Chief Security Officer on duty Answer: A Question: 92 According to Davidov and Malone, what is the centrepiece of the new global economy? A. The relationship between economics, security and policy B. Economics and Technology C. Vendor Ownership and Management Process recognition D. The virtual product, where major business functions are outsourced with hardly any internal departmentalization. Answer: D Question: 93 What are the three types of attacks used to defeat an access-controlled entry point? A. Deceit Physical attack Technical attack B. Social Engineering Physical attack Technical attack C. Assault Physical attack Technical attack D. Bribery Physical attack Technical attack Answer: A Question: 94 What four questions does risk management attempt to answer? A. What can be done? What options are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options? B. What is the cost? What options are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options? C. What can be done? What protocols are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options? D. Who is responsible for completing the Risk Management matrix? What options are available? What are the associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on future options? Answer: A Question: 95 What are the three classifications of loss in Insurance policies? A. Direct Loss Loss of use Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement) B. Indirect Loss Loss of use Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement) C. Direct Loss Replacement Cost Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement) D. Indirect Loss Replacement Cost Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement) Answer: A Question: 96 What are the five most common identifiers used to verify education history in a background check? A. Name while attending school Dates of attendance Graduation date Degree obtained Date of birth B. Name of primary school Dates of attendance Graduation date Degree obtained Date of birth C. Name while attending school Dates of attendance Qualification attained Degree obtained Date of birth D. Name while attending school Dates of attendance Country of Birth Degree obtained Date of birth Answer: A Question: 97 What value does company prosecution of employee drug offenses have? A. Minimal value B. More than $1000 C. More than $1500 D. Value less than $2000 Answer: A Question: 98 What is the debt to equity ratio? A. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder securities B. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder liabilities C. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder equity D. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total liabilities/shareholder accounts Answer: C Question: 99 In an investigation, what is generally the best reporting chain from the source of information to the decision maker? A. The shortest one B. Direct to CISO C. Direct to LE Partner D. To the Project Management Team Answer: A Question: 100 The three basic types of glass are A. Tinted, reflective, and insulated B. Heavy duty, medium duty and light duty C. Tempered, reinforced and coated D. Sheet, plate, and float Answer: A Question: 101 What are the five avenues of addressing risk? A. Analysis Transfer Spreading Reduction Acceptance B. Replacement Transfer Spreading Reduction Acceptance C. Avoidance Transfer Spreading Reduction Acceptance D. Review Transfer Spreading Reduction Acceptance Answer: C Question: 102 A major concern of a company, above all else, should be A. The care and well-being of its employees B. Reduction of shrinkage C. Policies and procedures D. Internal theft Answer: A Question: 103 What is natural territorial reinforcement? A. Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and accountability in property owners, managers, or occupants to increase vigilance in identifying trespassers. B. Construction of environmental barriers C. Natural territorial reinforcement is the process of integrating property with lighting D. Natural territorial reinforcement is the process of establishing a reporting system tied to a monitoring station Answer: A Question: 104 What are the three types of emergency operations plans? A. All hazards Standalone (different for reach emergency) Combination of all-hazards and standalone B. Medical hazards Standalone (different for reach emergency) Combination of all-hazards and standalone C. Natural Hazards Standalone (different for reach emergency) Combination of all-hazards and standalone D. Artificial hazards Standalone (different for reach emergency) Combination of all-hazards and standalone Answer: A Question: 105 What are the most common type of investigations in business settings? A. Incident investigations B. Harassment Investigations C. Assault investigations D. Theft Investigations Answer: A Question: 106 What is the best way to addressing infringements of copyrights, patents, and trademarks? A. By registering those rights B. By securing a trademark C. By security a copyright D. By securing a Patent Answer: A Question: 107 Which stakeholder group drives the ANSI standards development process? A. Consumers B. Government C. Industry Experts and Academics D. Standards users Answer: D Question: 108 What two ratios show how an organisation has done in making money during a reporting period? A. Return on assets = net income/total assets Return on equity = net income/shareholder equity B. Return on assets = net income/total shares Return on equity = net income/shareholder equity C. Return on assets = net shares/total shares Return on equity = net income/shareholder equity D. Return on assets = net income/total assets Return on equity = net outcomes/shareholder equity Answer: A Question: 109 Which two ratios demonstrate how well a firm has done in making money for a reporting period? A. Return on assets = net assets/total assets Return on equity = net income/shareholder equity B. Return on assets = net income/total assets Return on equity = net income/shareholder equity C. Return on assets = net income/total assets Return on equity = net outgoings/shareholder equity D. Return on assets = net income/total equity Return on equity = net income/shareholder equity Answer: B Question: 110 What members should comprise a vulnerability assessment team? A. Security specialist (leader) Security Systems engineer Response expert Data analyst Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts) B. Security specialist (leader) Security Systems engineer Response expert HR expert Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts) C. Security specialist (leader) Security Systems engineer Response expert CFO Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts) D. Security specialist (leader) Security Systems engineer Response expert CISO Operations Representatives Subject matter experts (locksmiths, technical writers, legal experts) Answer: B Question: 111 How long does withdrawal from narcotics take? A. 7 to 10 days B. 7 to 12 days C. 7 to 14 days D. 7 to 16 days Answer: A Question: 112 Who should be involved in developing a standard? A. A broad group of stakeholders and interested parties, working collaboratively B. Industry Experts C. Industry Experts and Academics D. Public and Private partnership Answer: A Question: 113 What organisation is the administrator and coordinator of the US private sector voluntary standardization system? A. The American National Standards Academy (ANSA) B. The American National Standards Institute (ANSI) C. ASIS D. The American National Standards Organisation (ANSO) Answer: B Question: 114 What are the first steps in upgrading a facility’s resistance to penetration? A. Defence in Depth B. Layered Protection C. Eliminating unnecessary doors and windows D. Technical Protection measures Answer: C Question: 115 What are the five principal resources of an Investigations Unit (IU)? A. People Information Credibility Physical assets Financial assets B. People Information Analysis Physical assets Financial assets C. People Information Intelligence Physical assets Financial assets D. Systems Information Credibility Physical assets Financial assets Answer: A Question: 116 How many workplace violence incidents are committed annually by intimates of the victim? A. 18,700 B. 18,500 C. 18,000 D. 19,000 Answer: A Question: 117 What are the thee most critical threats in high-rise structures? A. Fire Explosion Terrorism B. Fire Explosion Personnel C. Fire Explosion Infrastructure Damage D. Fire Explosion Contamination of support systems Answer: D Question: 118 What is the cost of loss formula? A. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of temporary insurance Ct = cost of temporary substitute Cr = total related costs Ci = lost income costs I = available insurance or indemnity a = allocable insurance premium amount B. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent insurance Ct = cost of temporary substitute Cr = total related costs Ci = lost income costs I = available insurance or indemnity a = allocable insurance premium amount C. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent replacement Ct = cost of temporary substitute Cr = total related costs Ci = lost income costs I = available insurance or indemnity a = allocable insurance premium amount D. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent replacement Ct = cost of temporary substitute Cr = total insurable costs Ci = lost income costs I = available insurance or indemnity a = allocable insurance premium amount Answer: C Question: 119 What is an effective way of setting the value of line items in a budget? A. Look at each budget expense as an investment and calculate the expected return on that investment B. Look at each budget expense as an investment and reduce the expected return on that investment C. Look at each budget expense as an investment and divide the expected return on that investment D. Look at each budget expense on its own and calculate the expected return on projected investments Answer: A Question: 120 How often should an emergency operations plan be audited? A. At least annually. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes. B. At least quarterly. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes. C. On demand. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes. D. Periodically. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and policy changes. Answer: A Question: 121 What are the five elements of the Incident Command System? A. Command Operations Planning Logistics Finance and administration B. Command Communications Planning Logistics Finance and administration C. Command Operations Legal Logistics Finance and administration D. Command Operations Planning Logistics HR Answer: A Question: 122 What are the immediate effects of cocaine use? A. Dilated pupils Elevated blood pressure Increased heart rate Euphoria B. Impaired reflexes Slurred speech Uncontrollable drowsiness C. Impaired reflexes Anger Uncontrollable drowsiness D. Impaired reflexes Slurred speech Detached interest Answer: A Question: 123 What are the four elements of emergency management? A. Mitigation Preparedness Response Recovery B. Communication Preparedness Response Recovery C. Mitigation Preparedness Resilience Recovery D. Mitigation Preparedness Response Reduction Answer: A Question: 124 Under what three conditions should undercover investigations definitely NOT be used? A. To investigate activity permitted or protected by law To replace a less costly form of investigation that will yield the same results To investigate protected union activities B. To investigate medical negligence cases To replace a less costly form of investigation that will yield the same results To investigate protected union activities C. To investigate activity permitted or protected by law To replace a less costly form of investigation that will yield the same results To investigate Law Enforcement incidents D. To investigate activity permitted or protected by law To investigate activities associated with minors To investigate protected union activities Answer: A Question: 125 What three elements are depicted in a cash flow statement? A. Net operating cash flow Net investing cash flow Pending funds due B. Net operating cash flow Net investing cash flow End of year statement C. Net operating cash flow Net investing cash flow Expected cash flow D. Net operating cash flow Net investing cash flow Financing cash flow Answer: D Question: 126 What are the three levels of investigative management? A. Strategic Operational Case B. Strategic Pivotal Case C. Personal Operational Case D. Commercial Operational Case Answer: A Question: 127 Who should be involved in developing a job requirements analysis? A. The hiring manager HR Team Legal Team B. The hiring manager HR Team Organisational leaders C. The hiring manager Other team members Organisational leaders D. The hiring manager HR Team Security Liaison Answer: C Question: 128 Who is the only corporate official who should retain a copy of an investigative report? A. The attorney of record B. CISO C. Law Enforcement D. Security Manager Answer: A Question: 129 What are some effects of depressants in large doses? A. Impaired reflexes Slurred speech Uncontrollable drowsiness B. Impaired reflexes Anger Uncontrollable drowsiness C. Impaired reflexes Slurred speech Detached interest D. Hunger and thirst Slurred speech Uncontrollable drowsiness Answer: A Question: 130 Department of Defense regulations regarding the protection of classified information requires that defense contractors maintain accountability of top secret information for a minimum time of: A. Three years B. Two years C. Five years D. One year Answer: A Question: 131 At what size and how far above the ground should an opening in a buildings shell be protected? A. Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 centimetres) and are lower that 18 feet (5.5 metres) above the ground. B. Reinforce or secure any openings in the building shell that measure more than 100 square inches and are lower that 18 feet above the ground. C. Reinforce or secure any openings in the building shell that measure more than 80 square inches and are lower that 18 feet (5.5 metres) above the ground. D. Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 centimetres) and are lower that 20 feet (6 metres) above the ground. Answer: A Question: 132 How many subjects should a single post order cover? A. Three B. Two C. One Answer: C Question: 133 Searches made during work hours as a result of a bomb threat call should be made by A. Employees familiar with the work area where the bomb is reportedly located B. The fire department C. The local police department D. The Department of Army personnel Answer: A Question: 134 What are the three goals of preemployment interviews? A. Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Allow transfer of missing information from the applicant to the employer Permit an assessment of the candidate B. Candidate selection Allow transfer of missing information from the applicant to the employer Permit an assessment of the candidate C. Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Verification of credentials Permit an assessment of the candidate D. Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Allow transfer of missing information from the applicant to the employer Exam Job History Answer: A Question: 135 What is CPTED? A. CPTED, or crime prevention through environmental design is the design or redesign of a venue to maximise access to a site B. Physical Barriers on a site C. Electronic, Physical and Procedural designs D. CPTED, or crime prevention through environmental design is the design or redesign of a venue to reduce crime opportunity and fear of crime through natural, mechanical, or procedural means. Answer: D Question: 136 When is containment a good strategy? A. When theft is the adversary’s goal. Containment involves preventing the adversary from leaving the site with stolen items. B. When assisted by Law Enforcement C. When access to firearms is available D. When there is company fraud or embezzlement Answer: A Question: 137 Who should be assigned the role of an organisations emergency coordinator? A. Someone regularly responsible for handling emergencies, such as the head of security or engineering. B. Someone regularly responsible for handling emergencies, such as the Business Continuity Manager. C. Someone regularly responsible for handling emergencies, such as the head of crisis management D. Someone regularly responsible for handling emergencies, such as the COO. Answer: A Question: 138 What are the three main limitations of financial statement analysis? A. It doesn’t consider changes in market conditions All organisations operate in similar markets Financial reports must be accurate for financial ratios to have meaning B. It doesn’t consider changes in market conditions All organisations operate differently and target different markets Financial reports must be accurate for financial ratios to have meaning C. It considers changes in market conditions All organisations operate differently and target different markets Financial reports must be accurate for financial ratios to have meaning D. It considers changes in market conditions All organisations operate in similar markets Financial reports must be accurate for financial ratios to have meaning Answer: B Question: 139 What is the underlying equation of the balance sheet? A. Assets = liabilities + stock B. Assets = liabilities + shareholder equity C. Assets = liabilities + stock cost D. Assets = liabilities + shareholder equity + RSU cost Answer: B Question: 140 One of the following is not prohibited by the Federal Civil Rights Act during an investigation: A. Asking questions about prior convictions B. Directing inquiry into areas of religion or sex for discriminatory purposes C. Directing inquiry into areas of race or color for discriminatory purposes D. Asking questions about prior arrests Answer: A Question: 141 What are the five pillars of ISO standards? A. Equal footing of members Market need Consensus Voluntary participation and application Worldwide applicability B. Equal footing of members Direction of Market Consensus Voluntary participation and application Worldwide applicability C. Equal footing of members Direction of Market Global alignment Voluntary participation and application Worldwide applicability D. Equal footing of members Direction of Market Economic Need Voluntary participation and application Worldwide applicability Answer: A Question: 142 Wired glass is intended to provide resistance to A. Knives and hammers B. Shattering and fragmentation C. Bullets or other high-energy missiles D. Fire Answer: A Question: 143 What departments are typically involved in preemployment background screening? A. Human resources Security Business units Legal B. Finance Security Business units Legal C. Human resources Security Vendor manager Legal D. Business Continuity Security Business units Legal Answer: A Question: 144 What is sometimes referred to as the private sector version of emergency management? A. Business continuity B. Resilience C. Disaster Recovery D. Emergency Protocol Answer: A Question: 145 What should be the primary basis for camera selection? A. The sensitivity required for a full video output signal under optimal conditions B. Location C. Site Selection and Cost accrued D. The sensitivity required for a full video output signal in the lighting environment in the area to be assessed Answer: D Question: 146 What three factors are driving the growth of private policing? A. Economic and operational issues (Fear of) crime and violence Order maintenance B. Economic and operational issues (Fear of) crime and violence Cost replacement C. Economic and operational issues Access to firearms Order maintenance D. Legal and Security issues (Fear of) crime and violence Order maintenance Answer: A Question: 147 What are the four key challenges to watch for when operating within a joint task force? A. Parochialism Protection of sensitive information Data management Reporting chains B. Jurisdiction Protection of sensitive information Data management Reporting chains C. Parochialism GDPR Data management Reporting chains D. Data Sources Chain security Data management Reporting chains Answer: A Question: 148 Who should make up the investigative team for an undercover investigation? A. A corporate decision maker An HR representative A corporate security professional An attorney familiar with employment law B. CISO/COO An HR representative A corporate security professional An attorney familiar with employment law C. A corporate decision maker An LE representative A corporate security professional An attorney familiar with employment law D. LE Rep, CISO, & CFO An HR representative A corporate security professional An attorney familiar with employment law Answer: A Question: 149 What are the three force multipliers in investigations? A. Online information sources (e.g. commercial databases) Liaison (e.g. joint task forces) Intelligence information (e.g. informants) B. Personnel Processes Intelligence information C. Personnel Processes Protocols D. Personnel Processes Liaison Answer: A Question: 150 What is the rule of thumb for allocating for spare parts purchases in a budget? A. About 5 percent of the capital cost of equipment for a location should be allocated each year for spare parts B. About 6 percent of the capital cost of equipment for a location should be allocated each year for spare parts C. About 7 percent of the capital cost of equipment for a location should be allocated each year for spare parts D. About 9 percent of the capital cost of equipment for a location should be allocated each year for spare parts Answer: A Question: 151 What is unity of command? A. An individual should only report to only one supervisor B. An individual can report to more than one supervisor C. An individual should not only report to only one supervisor D. An individual can report to multiple leads if the operation demands Answer: A Question: 152 Assets protection is increasingly based on what principle? A. Risk management. B. Insurance Cost C. Legal requirement D. Cost of replacement Answer: A Question: 153 What is OPSEC? A. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect critical information. It responds to the fact that small bits of information from different sources can be combined to reveal sensitive information B. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect personal identifiable information. It responds to the fact that small bits of information from different sources can be combined to reveal sensitive information C. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect business specific information that relates directly to the company. It responds to the fact that small bits of information from different sources can be combined to reveal sensitive information D. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect critical government information. It specifically refers to national level information and intelligence and how it should be stored, shared and destroyed Answer: A Question: 154 Which kind of investigations cannot be done without police assistance? A. Ones involving illegal drugs B. Ones involving minors C. Ones involving union activity D. Ones involving multi-jurisdictional activities Answer: A Question: 155 What is the most fundamental form of communication in undercover assignments? A. Written reports B. Telephone Reports C. Email D. Verbal Brief Answer: A Question: 156 In executive protection (EP), what is an advance? A. The process of researching a destination before the principal arrives B. Moving vehicles forward C. Responding to an active threat D. Protecting the client from live fire Answer: A Question: 157 What are the five basic functions of management? A. Planning Organisation Delegating Coordinating Controlling B. Planning Organisation Directing Coordinating Referral C. Planning Hiring Directing Coordinating Controlling D. Planning Organisation Directing Coordinating Controlling Answer: D Question: 158 The Law of Torts deals with A. Intentional acts and negligent acts B. Negligence and inadvertent conduct that cause damage or injury C. Trademark infringement D. Torts against persons and torts against property Answer: A Question: 159 What is colour rendition? A. The ability of a lamp to identify colours seen in an object B. The ability of a lamp to record the colours seen in an object C. The ability of a lamp to faithfully reproduce the colours seen in an object D. The ability of a lamp to minimise and reduce the colours seen in an object Answer: C Question: 160 Unclassified material should be marked: A. With no marking B. "Unclassified" at the top of the page C. "Unclassified" at the top and bottom of the page D. "Unclassified" at the bottom of the page Answer: A Question: 161 When should an undercover investigation be used? A. An undercover investigation is appropriate only when no other alternatives are available and the company can reasonably expect a significant return on investment B. When there is a suspicion of drug dealing C. An undercover investigation is appropriate when law enforcement direct D. When there is company fraud or embezzlement Answer: A Question: 162 What is the chain of action that must occur if a principal is attacked? A. Arm’s reach (immobilize attacker if within arm’s reach, otherwise cover the principal) Sound off (shout the weapon displayed and the direction, in relation to the principal, from which it is coming) Cover Evacuate B. Protect the client from live fire C. Move to vehicles D. Contact Law Enforcement for assistance Answer: A Question: 163 What are the five forces shaping assets protection globally? A. Collaboration in Systems Globalisation in business Standards and regulation Convergence of security solutions Homeland security and international security environment B. Visualisation and Connectivity Globalisation in business Standards and regulation Convergence of security solutions Homeland security and international security environment C. Technology and touch Globalisation in business Standards and regulation Convergence of security solutions Homeland security and international security environment D. Emergency Management Standards and regulation Convergence of security solutions Homeland security and international security environment Answer: C Question: 164 Which two earnings C related ratios are commonly examined in financial analysis? A. Earnings per share = net income/total shares Price to earnings = price per share/earnings per share B. Earnings per share = net assets/total shares Price to earnings = price per share/earnings per share C. Earnings per share = net income/total shares Price to earnings = price per share/earnings after sales D. Earnings per share = net income/total shares Price to earnings = price per share/earnings per quarter Answer: A Question: 165 What are the most challenging problems in international investigations? A. Cultural differences create challenges in international investigations B. Conflicting legal obligations from multi-jurisdictional locations C. Data Protection and GDPR obligations D. Identifying a single mechanism for the sharing of operational information Answer: A Question: 166 Who should be made aware of the existence of an undercover investigation? A. Only those with an absolute need to know B. CISO, CFO & HR C. CISO, CFO, HR, and Legal only D. Law Enforcement Answer: A Question: 167 At a minimum, who should be part of the workplace violence incident management team (IMT)? A. A senior management representative A senior HR manager A senior security manager A legal representative familiar with labour and employment law B. A senior management representative A senior HR manager The CISO A legal representative familiar with labour and employment law C. A LE representative A senior HR manager A senior security manager A legal representative familiar with labour and employment law D. A union representative A senior HR manager A senior security manager A legal representative familiar with labour and employment law Answer: A Question: 168 What is the most important consideration when a security person deals with a disturbed person? A. Bringing the person into custody and eliminating immediate danger B. Evacuating the area C. Contacting Law Enforcement D. Placing the site into Lockdown status Answer: A Question: 169 What is a Patent? A. A Patent is a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time. B. Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source. C. Legal protection of the expression of ideas in literary, artistic, and musical works. D. A Patent is a the hereditary right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time. Answer: A Question: 170 Why should colour be used sparingly in graphical alarm displays? A. Because 10 percent of the population has some form of colour blindness B. Because 5 percent of the population has some form of colour blindness C. Because 15 percent of the population has some form of colour blindness D. Because 13 percent of the population has some form of colour blindness Answer: A Question: 171 According to Peter Drucker, what is the most crucial question in defining business purpose and mission? A. Who is the customer? B. What is the goal? C. Who is responsible? D. What is the product? Answer: A Question: 172 What four situations do workplace misconduct investigations typically address? A. Conflict of interest Corporate resource abuse/theft Workplace violence Substance abuse B. Conflict of interest Sexual Assault Workplace violence Substance abuse C. Defamation Corporate resource abuse/theft Workplace violence Substance abuse D. Embezzlement Corporate resource abuse/theft Workplace violence Substance abuse Answer: A Question: 173 What are the three basic stages of addiction? A. Increased tolerance to the drug Increased rationalization and lying Obsession with the substance B. Anger Uncontrollable drowsiness C. Impaired reflexes Slurred speech Detached interest D. Hunger and thirst Slurred speech Uncontrollable drowsiness Answer: A Question: 174 What kinds of companies are particularly vulnerable to counterfeiting and piracy? A. Start-ups Early stage firms Small and medium size companies that are rich in intangible assets B. Start-ups Pre IPO Small and medium size companies that are rich in intangible assets C. Start-ups Early stage firms Tech Firms D. Start-ups & Financial Institutions Tech Firms Small and medium size companies that are rich in intangible assets Answer: A Question: 175 What is the effective range of MANPADS? A. 1 to 3.5 kilometres (0.06 to 2.2 miles) B. 1 to 4.5 kilometres (0.06 to 2.8 miles) C. 1 to 5.5 kilometres (0.06 to 4 miles) D. 1 to 6 kilometres (0.06 to 5 miles) Answer: A Question: 176 What is a primary benefit of zero-based budgeting? A. Zero based budgeting may force managers to consider alternative ways of getting the job done B. Zero based budgeting may force managers to consider seeking alternate funding C. Zero based budgeting may force managers to request additional supports D. Zero based budgeting may force managers to consider streamlining the operation Answer: A Question: 177 What is the best source of a protection dog? A. A reputable professional breeder. B. Through ASIS programs C. Through online adverts D. Through personal referral Answer: A Question: 178 A capacitance sensor is an electric condenser that radiates A. Energy B. Heat C. Light D. Sound Answer: A Question: 179 Which is the most important type of screening investigation process in a corporate organization A. Data security B. Theft C. Background D. Security violation Answer: A Question: 180 What is the main potential problem in an undercover investigation? A. The possibility that the investigation will be exposed or compromised B. Discovery and assault C. Clear reporting chains D. Cost involved Answer: A Question: 181 On what should the decision of whether to arm an officer be based? A. Budgeting and Training B. Whether there is greater danger to life safety without a weapon Whether the officer may reasonably be expected to use fatal force C. Local Legislation and availability of firearms D. Availability of competent trained personnel Answer: B Question: 182 What elements constitute the Investigation lifecycle? A. Initiation Investigation Reporting & Results B. Incident Report Investigation Reporting & Results C. Analysis Investigation Reporting & Results D. Initiation Investigation Determination Answer: A Question: 183 Inquiries about an investigation can be connected to the investigative results by means of A. Ordering B. Grouping C. Classification D. Indexing Answer: A Question: 184 The term for a strike that occurs when management and unions fail to negotiate an agreement on benefits is A. Unfair labour practice B. Wildcat C. Right to Work D. Economic Answer: A Question: 185 Who should make up the project management team for an undercover investigation? A. Undercover investigator Project manager Client representative Corporate attorney Law enforcement representative (if necessary) B. Undercover investigator HR manager Security representative Corporate attorney Law enforcement representative (if necessary) C. Senior Company Rep HR manager Security representative Corporate attorney Law enforcement representative (if necessary) D. Union Rep HR manager Security representative Corporate attorney Law enforcement representative (if necessary) Answer: A Question: 186 What is the operating principle of ISO’s management systems standards? A. The Plan-Do-Check-Act cycle B. Direction and Coordination C. Organisational Demand D. International alignment Answer: A Question: 187 What two values describe sensor effectiveness? A. Location of Sensor Lighting B. Probability of detection Lighting C. Location of Sensor Confidence level D. Probability of detection Confidence level Answer: D Question: 188 What is a Copyright? A. Legal protection of the expression of ideas in literary, artistic, and musical works. B. Legal protection for words, names, symbols, devices, or images applied to products or used in connection with goods or services to identify their source. C. Legal protection for a property right granted to an inventor to exclude others from making, using, offering for sale, or selling the invention for a limited time. D. Legal protection of the expression of ideas in corporate law and policy. Answer: A Question: 189 What are the three primary objectives of emergency management? A. Minimize the probability of an emergency Mitigate the impact of the emergency Recover from the emergency and resume normal operations B. Minimize the probability of an emergency Mitigate the impact of the emergency Recover from the emergency and prepare the communications plan C. Minimize the probability of a reoccurrence Mitigate the impact of the emergency Recover from the emergency and resume normal operations D. Minimize the probability of an emergency Mitigate the cost of the emergency Recover from the emergency and resume normal operations Answer: A Question: 190 What is good practice to make sure a guest wears a badge while on the premises? A. Explain to the person that the badge permits immediate recognition by and assistance from employees B. Identification of approved guests and employees C. Explain to the person that the badge must be worn otherwise they will have to leave the site D. Explain to the person that the badge is a legal requirement Answer: A Question: 191 How is the response function of a physical protection system (PPS) measured A. The response function of a PPS is measured by the time between receipt of communication of adversary action and the arrest of the adversary B. The response function of a PPS is measured by the time between the alarm time and incident closure C. The response function of a PPS is measured by the time between receipt of communication of adversary action and the arrival of law enforcement D. The response function of a PPS is measured by the time between receipt of communication of adversary action and the interruption of the adversary action Answer: D Question: 192 What is the biggest challenge in investigating workplace misconduct issues? A. Getting employees to report wrongdoing B. GDPR Alignment C. Legal Oversight D. Coordinate with Law Enforcement and Legal Counsel Answer: A Question: 193 How does the progression of interviews differ between regular investigations and undercover investigations? A. In regular investigations, the interview process closes in on the perpetrators over time. Undercover investigations begin with those most involved and work towards those less involved B. Undercover investigations are not legally covered outside the company C. Undercover investigations cannot be used to reclaim company assets D. In regular investigations LE assistance may be necessary. In undercover investigations LE assistance is prohibited unless approved by Legal Answer: A Question: 194 What is the least understood and most underused form of investigation? A. Undercover investigations B. Fraud Investigations C. Assault investigations D. Personal Injury Answer: A Question: 195 What are the effects of large doses of cocaine? A. Bizarre behaviour Tremors Vertigo Muscle twitches Paranoia Toxic reaction B. Craving Loss of control Physical dependence Tolerance C. Impaired reflexes Slurred speech Uncontrollable drowsiness D. Impaired reflexes Anger Uncontrollable drowsiness Answer: A Question: 196 What are general orders? A. Guidelines for Operations B. Canons, or bodies of principles, for protection officers (e.g. No smoking on duty) C. Suggested Guidelines for protection officers D. Recommended guidelines and principles, for protection officers (e.g. No smoking on duty) Answer: B Question: 197 What is ‘working the principal’? A. The choreography used by an executive protection specialist to physically move about with the principal. B. Moving vehicles forward C. Responding to an active threat D. Protecting the client from live fire Answer: A Question: 198 What are the four symptoms of alcohol dependence? A. Craving Loss of control Physical dependence Tolerance B. Impaired reflexes Slurred speech Uncontrollable drowsiness C. Impaired reflexes Anger Uncontrollable drowsiness D. Craving Loss of control Anger Tolerance Answer: A Question: 199 What are a company’s top two valuable resources? A. #1 C employees #2 C assets B. #1 C employees #2 C corporate knowledge C. #1 C C Level Execs #2 C corporate knowledge D. #1 C employees #2 C Profit & Loss statement Answer: B Question: 200 Which of the following substances would induce poor perception of time and distance A. Hallucinogens B. Stimulants C. Narcotics D. Depressants Answer: A Question: 201 For effective bulk explosive detection, how often must a person be screened by low dose backscatter x-ray devices? A. Twice B. Three times C. Four Times D. Once Answer: A Question: 202 What are the two most popular breeds of protection dogs in the United States? A. German Shepherd Doberman Pincher B. German Shepherd Alsation C. German Shepherd Husky D. Labrador Cross Doberman Pincher Answer: A Question: 203 What are the five qualities that characterise an effective, reliable investigation? A. Objectivity Thoroughness Relevance Accuracy Timeliness B. Objectivity Communication Relevance Accuracy Timeliness C. Objectivity Thoroughness Relevance Experience Timeliness D. Objectivity Thoroughness Analysis Accuracy Timeliness Answer: A Question: 204 What four major areas does assets protection cover in the telecommunications sector? A. Information security Network/computer security Fraud prevention Physical security B. Information security Network/computer security Business Continuity Physical security C. Information security Emergency Management Fraud prevention Physical security D. Information security Network/computer security Fraud prevention Physical Intervention Answer: A Question: 205 What should every job offer be based on? A. Satisfactory completion of preemployment background checks B. Personal recommendation C. Medical screening D. Completion of training program Answer: A Question: 206 What are the two key measurements for the effectiveness of the detection function of a physical protection system? (PPS) A. Probability of sensing adversary action and Implementation of effective countermeasures B. Target identification and Isolation of the incident C. Implementation of countermeasures Evaluation of effectiveness D. Probability of sensing adversary action, Time required for reporting and assessing the alarm. Answer: A Question: 207 In setting up a proprietary investigative unit, the most important aspect to consider is the: A. Number of personnel B. Budgeting for staff C. Selection of professional personnel D. Specialized training of the applicant Answer: A Question: 208 What is the process by which an employer verifies the experience and qualifications presented by a job candidate? A. Credentialing B. Background Check C. Screening D. Verification Answer: A Question: 209 What are the two basic analytical approaches to a risk assessment? A. Compliance based and Descriptive B. Quantitively and Qualative C. Metrics and Graphical D. Compliance based Performance based Answer: D Question: 210 What are the four approaches to situational crime prevention? A. Increase the effort required (e.g. target hardening, access control), Increased artificial lighting Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting) B. Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting) C. Increase the effort required (e.g. target hardening, access control), Investment in CPTED Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule setting) D. Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling) Answer: B Question: 211 What is defensible space? A. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment that would encourage residents to proactively report all security incidents and events in the local environment B. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behaviour from residents that would contribute significantly to their safety. It directly leads to increased costs associated with security services C. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment would prevent residents from reporting security incidents or events D. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical construction of a residential environment could elicit behaviour from residents that would contribute significantly to their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for surveillance. Answer: D Question: 212 What is the typical initiation event in a private sector incident investigation? A. An incident report B. Alarm activation C. Law Enforcement report D. Confidential Informant Answer: A Question: 213 What five guidelines should be observed for workplace drug purchases that are part of an investigation? A. Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use B. Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases on company time Record all transactions C. Qualify the dealer Coordinate with Legal Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use D. Qualify the dealer Coordinate with Legal & HR Buy down, not up (purchase a small amount) Make purchases on company time Avoid actual drug use Answer: A Question: 214 One of the following is not prohibited by the Federal Civil Rights Act during an investigation A. All B. A record C. A custodian of record D. A public official Answer: A Question: 215 Who may edit officers incident entries in a database log? A. CISO, CFO, HR, and Legal B. Security Officers C. Higher level supervisors D. Nobody Answer: C Question: 216 How does situational crime prevention differ from CPTED and defensible space? A. Situational crime prevention seeks to reduce crime opportunities in public and private environments where applicable B. Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, not just in the built environment. C. Situational crime prevention seeks to reduce crime opportunities through integrating public and private enterprises D. Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, in tandem with legal guidelines and oversight Answer: B Question: 217 In what two ways can an undercover operative be placed? A. Cold Hire (operative applies for a job just like any other applicant) Controlled Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed) B. Cold Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed) C. Immediate Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed) D. Open Hire (operative applies for a job just like any other applicant) Closed Hire (the employment process is covertly manipulated so the operative is hired and appropriately placed) Answer: A Question: 218 Workplace crime is the function of which three fundamental elements? A. Quality of hires Environment in which staff is placed Quality of supervision over environment and staff B. Opportunity, Motive, Ability C. Opportunity, Motive and quality of personnel D. Quality of hires Motivation Quality of supervision over environment and staff Answer: A Question: 219 Why might lower-level managers more readily accept a bottom-up budget? A. To allow for future operational increases B. Because it is a CFO direction C. Because they had a role in developing it D. To ensure alignment Answer: C Question: 220 What are the three main tools of an investigator? A. Information Interrogation Instrumentation B. Information Analysis Instrumentation C. Information Intelligence Instrumentation D. Analysis Intelligence Instrumentation Answer: A Question: 221 What is the goal of a vulnerability assessment? A. To identify physical protection system (PPS) components in the functional areas of site security and to gather data to estimate site performance against particular threats. B. To identify physical protection system (PPS) components in the functional areas of entry and access and to gather data to estimate their performance against particular threats. C. To identify physical protection system (PPS) components in the functional areas of detection, delay and response and to gather data to estimate their performance against particular threats. D. To identify physical protection system (PPS) components in the functional areas of emergency management and business continuity and to gather data to estimate their performance against particular threats. Answer: C Question: 222 What is the difference between asset protection and security? A. Assets protection includes all security functions, as well as related functions such as investigations, legal oversight, risk management, safety, compliance, and emergency management. B. Assets protection includes only physical security related functions. C. Assets protection includes all security functions, as well as related functions such as investigations, risk management, safety, human resources, compliance, and emergency management. D. Assets protection includes all security functions, as well as related functions such as investigations, risk management, safety, compliance, and emergency management. Answer: D Question: 223 With respect to span of control, the greater the degree of sophistication of interaction between supervisors and subordinates, the A. Broader the optimum span of control B. More difficult it is to identify the optimum span of control C. Narrower the optimum span of control D. More options there are in choosing the optimum span of control Answer: A Question: 224 What type of extremists pose the most dangerous threat to the world today? A. Global jihadists B. Single ideology extremists C. Zero day terrorists D. Independence Extremists Answer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