Pass the ASIS Physical Security Professional ASIS-PSP Questions and answers with CertsForce

Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions
Questions # 1:

Premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents, usually intended to influence an audience is called:

Options:

A.

Theft


B.

Terrorism


C.

Violence


D.

Criminal approach


Questions # 2:

Advice commonly purchased from consultant consists of which of the following information?

Options:

A.

Number, quantity, and use of security personnel


B.

Direction and content of security policies and procedures


C.

Alternatives in security hardware


D.

All of the above


Questions # 3:

The term used to express the output of a light source is called a:

Options:

A.

Pixel


B.

Watt


C.

Lumen


D.

Fresnel


Questions # 4:

Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.

Options:

A.

Asset standard Act


B.

Material Safety Data Sheet


C.

Procurement Asset Safety Program


D.

Product stability program


Questions # 5:

Which of the following is NOT the organizational level of international terrorism?

Options:

A.

Individual terrorism


B.

Modern terrorism


C.

Group terrorism


D.

State terrorism


Questions # 6:

The three keys to a successful contact are:

Options:

A.

accessibility, reviews and resource management


B.

accessibility, meetings and performance


C.

accessibility, meetings and resource management


D.

measurement, meetings and resource management


Questions # 7:

The determination of Physical Protection System (PPS) objectives begins with:

Options:

A.

Documenting an iterative risk and risk mitigation analysis


B.

Evaluating the budget


C.

Developing a thorough description of the facility and processes


D.

Composing a business case for senior management approval


Questions # 8:

Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.

Options:

A.

True


B.

False


Questions # 9:

When yard space and warehousing is required even in urban areas, __________ is the boundary of the property owned by the company.

Options:

A.

Fence


B.

Wall


C.

Perimeter


D.

Chain link


Questions # 10:

During an attack, the critical detection point occurs when the remaining attack path exceeds:

Options:

A.

Response time


B.

Probability of detection


C.

Probability of interruption


D.

Remaining delay time


Viewing page 1 out of 10 pages
Viewing questions 1-10 out of questions