Pass the ASIS Certified Protection Professional ASIS-CPP Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which of the following statements best describes the difference between covert and overt surveillance?

Options:

A.

Overt surveillance may be used by public and private sector personnel, whereas covert surveillance may only be done by public law enforcement personnel.


B.

Covert surveillances are normally detection-oriented, whereas overt surveillances are usually prevention-oriented.


C.

Covert surveillances are used when there is knowledge of a criminal act, whereas overt surveillance is used when a criminal act is suspected.


D.

Notice of overt surveillance must always be given, whereas covert surveillance may be conducted without the suspect or target's knowledge.


Expert Solution
Questions # 52:

Which method of wiretapping does not require a physical connection to a line?

Options:

A.

Inductive coupling


B.

Connective functioning


C.

Active imaging


D.

Hardwire connection


Expert Solution
Questions # 53:

Which of the following represents the crossover error rate for biometric technology?

Options:

A.

It measures the acceptable number of failures that a security firm is willing to tolerate.


B.

The point at which the number of false rejections equals the false acceptances.


C.

The frequency of false rejections.


D.

The point at which the number of positive rejections equals the false acceptances.


Expert Solution
Questions # 54:

The first step in the "general security risk assessment flow chart" is to:

Options:

A.

identify assets.


B.

specify loss events.


C.

identity impact of events.


D.

conduct cost/benefit analysis.


Expert Solution
Questions # 55:

The final step in conducting a security risk analysis is consideration of the cost versus the benefit of:

Options:

A.

human resources strategy.


B.

security strategy.


C.

insurance.


D.

risk strategy.


Expert Solution
Questions # 56:

An effective as set-protection scheme comprising a series of well-planned and complementary levels of security is called:

Options:

A.

defense in depth.


B.

strategic risk management


C.

risk management.


D.

paradigm shift frequency protection


Expert Solution
Questions # 57:

Which type of risk countermeasure is generally the least expensive?

Options:

A.

Electronic systems


B.

Contract guard services


C.

Procedural controls


D.

Guard dogs


Expert Solution
Questions # 58:

Knowing where security fits into a company's budget is critical to the manager successfully accessing financial resources. Which of the following statements best describes a security department's impact on the bottom line?

Options:

A.

The security department's costs must be minimized to reduce the expense side of the corporate ledger


B.

The security department is an investment with a predictable rate of return.


C.

The security department's expense requests must be supported by a cost-benefit analysis.


D.

The security department helps the profit margin by reducing or preventing losses of company assets.


Expert Solution
Questions # 59:

To determine a return on an investment, it would be best to use which of the following?

Options:

A.

Overhead as a % of profit


B.

Increased profits as a % of sales


C.

Profits as a % of capital investment


D.

Potential losses as a % of sales


Expert Solution
Questions # 60:

Media relations are best handled by:

Options:

A.

retention of a media consultant throughout the duration of the critical incident.


B.

assignment of one press information officer for each operational section.


C.

assignment of a single public relations director.


D.

daily rotation of the media relations assignment to guard against burnout.


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions