New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ASIS ASIS-CPP - Certified Protection Professional (CPP) Exam

Page: 3 / 7
Total 230 questions

The starting point for pre-employment screening is the:

A.

list of references.

B.

application.

C.

interview.

D.

resume.

The term "hot site" refers to a:

A.

location that has sustained a major amount of radiation.

B.

location where stolen computer components are stored prior to resale.

C.

site where the HVAC system failed, making computer operations unfeasible.

D.

standby alternate site with duplicate hardware and operating software.

Risk acceptance is an informed decision to take a particular risk and:

A.

can occur without risk treatment, process of selection. or implementation of measures to modify risk.

B.

involves the process of identifying internal and external threats and vulnerabilities.

C.

generally includes coordinated activities to direct and control an organization in regard to risk.

D.

defines the controls in place necessary to reduce exposure and evaluate the cost of such controls.

Which factor about a risk would make it uninsurable?

A.

Losses would be expected but unintended by the insured.

B.

Losses could not be positively tied to an occurrence in an established amount.

C.

The risk is predictable through the law of large numbers.

D.

The risk would be worth the cost but not the effort to insure.

When designing a solution for a facility or upgrading existing components, the design and implementation will have to follow:

A.

a combination of the operator/user, designer and/or consultant.

B.

the directive of the authority having jurisdiction

C.

the cultural fit of the organization where the system is to be implemented.

D.

national and local building, fire, and life safety codes.

In developing a proprietary security organization, it is necessary to first:

A.

obtain a consultant's analysis of needs.

B.

estimate operating costs.

C.

identity tasks.

D.

develop an implementation timeline.

In order to measure an applicant's compatibility for a certain position, it is necessary to initiate a/an:

A.

intelligence/aptitude test.

B.

pre-employment/psychological test.

C.

medical/physical test.

D.

personality/integrity test.

Which of the following can be used to authenticate and authorize computer access?

A.

What a person has/what a person knows/who a person is

B.

What a person has/what a person transfers/what a person is

C.

Who a person knows/what a person has/what a person inserts

D.

What a person presents/what a person inserts/what a person has

A security officer must testify in a civil lawsuit involving the alleged wrongful termination of a former employee for violation of company rules. To best prepare himself for the trial, the security officer should first;

A.

discuss the case with other security officers.

B.

review his notes and reports on the incident.

C.

review his testimony with the employee's attorney.

D.

sign out the evidence in order to look it over.

Applicant falsifications generally fall into two categories, misrepresentation and:

A.

embellishment of positions held.

B.

conflicting dales of employment

C.

inadequate reference identification.

D.

willful omissions of material facts.