New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ASIS ASIS-CPP - Certified Protection Professional (CPP) Exam

Page: 5 / 7
Total 230 questions

The ISO 27001 and ISO 27002 standards are important for the information systems security (ISS) practitioner because they:

A.

ensure absolute compliance with the payment card industry data security standard (PCI DSS).

B.

represent the first acknowledged worldwide standards to identify a code of practice for the management of information technology

C.

ensure absolute compliance with the advanced encryption standard.

D.

represent the first acknowledged worldwide standards to identify a code of practice for the management of information security.

To maintain effective liaison relationships, an investigator must avoid:

A.

making sure each party receives benefits.

B.

contacting the liaison periodically.

C.

violating the trust of the liaison contact.

D.

contacting the liaison only when specific information is needed.

The human behavior theory that a person is actuated by values, beginning with the most basic need for survival, is:

A.

Maslow's Hierarchy of Needs.

B.

Corey's "First Things First."

C.

McGregor's Theory X and Theory Y.

D.

Herzberg's Motivation Theory.

Evolving trends within the security profession fall into the areas of:

A.

surveillance and protection.

B.

risk identification and risk control.

C.

security technology, organization, and human resources.

D.

personnel, training, and communications.

A shift supervisor of security officers would be placed in which classification of the management pyramid?

A.

Executives

B.

First-line managers

C.

Second-line managers

D.

Middle managers

An affiliation of organizations agreeing to assist each other during an emergency by providing materials, equipment, and personnel is known as a/an:

A.

incident response association

B.

crisis support organization.

C.

business support association.

D.

mutual aid association.

Which of the following is the basis for all effective security activity?

A.

The security plan or program is based on the use of proprietary guard services to assure proper staffing.

B.

A complete and thorough security manual has been developed.

C.

The security program must have sufficient funding.

D.

The security plan or program is based on an understanding of the risks it is designed to control.

A strategic approach to managing assets protection programs involves:

A.

planning, controlling, and reviewing.

B.

training, equipping, and reviewing.

C.

guiding, resourcing, and auditing.

D.

planning, managing, and evaluating.

Which of the following tools can greatly enhance the security of wireless communications?

A.

DRP

B.

VPN

C.

WAN

D.

DES

A leader who is responsible for maintaining an organization's ethical climate and fostering appropriate corporate behavior should review the organization's:

A.

employment agreements and job titles and description.

B.

ethics policy and industry standards and guidelines.

C.

loss reports and notes or minutes from management meetings.

D.

corporate values statement and management policies and procedures.