New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

ASIS ASIS-CPP - Certified Protection Professional (CPP) Exam

Page: 6 / 7
Total 230 questions

To conduct the job analysis, it is necessary to define the positions within the security department and identify the:

A.

compensation and benefits for each position.

B.

minimum required staffing levels.

C.

behaviors necessary to perform those jobs.

D.

number of positions by category.

The ultimate value of loss reporting is the:

A.

determination of required insurance deductibles.

B.

forecasting of the next year's budget

C.

tracking and monitoring of properly records.

D.

opportunity created for predicting and preventing future losses.

The most important skill required of an effective security manager is:

A.

organization.

B.

employee development.

C.

delegation.

D.

communication.

The goal of emergency planning is to provide for the protection of life and property, the containment of loss, and the:

A.

collaboration with media personnel.

B.

creation of an understanding between management and employees.

C.

prompt restoration of normal operations.

D.

clear training of emergency personnel.

The first step in security planning is:

A.

determining what can be accomplished with available resources.

B.

performing an analysis of potential areas of loss, their probability, and their gravity.

C.

laying out a plan for internal and external security.

D.

maintaining an appropriate budget.

According to the Myers-Briggs Type Indicator, which type of person is energy conscious, enjoys being with large groups of people, and prefers to act rather than reflect?

A.

Introverted

B.

Judging

C.

Perceiving

D.

Extroverted

Knowing where security fits into a company's budget is critical to the manager successfully accessing financial resources. Which of the following statements best describes a security department's impact on the bottom line?

A.

The security department's costs must be minimized to reduce the expense side of the corporate ledger

B.

The security department is an investment with a predictable rate of return.

C.

The security department's expense requests must be supported by a cost-benefit analysis.

D.

The security department helps the profit margin by reducing or preventing losses of company assets.

Performing a vulnerability analysis, selecting and installing countermeasures, and testing the operating program are three general steps in the:

A.

conducting of a security survey.

B.

design of a fully integrated security system.

C.

selection of a comprehensive security system.

D.

systems approach to an asset protection program.

Which of the following represents the crossover error rate for biometric technology?

A.

It measures the acceptable number of failures that a security firm is willing to tolerate.

B.

The point at which the number of false rejections equals the false acceptances.

C.

The frequency of false rejections.

D.

The point at which the number of positive rejections equals the false acceptances.

Cost avoidance can best be described as the:

A.

amount of losses that likely would have occurred without the security program.

B.

cost of the loss-prevention program.

C.

amount of losses that likely would have occurred without a disaster recovery plan.

D.

savings achieved through outsourcing.