Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ASIS Physical Security Professional ASIS-PSP Questions and answers with Dumpstech

Exam ASIS-PSP Premium Access

View all detail and faqs for the ASIS-PSP exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions
Questions # 21:

How often should a post-implementation evaluation test be performed?

Options:

A.

Monthly

B.

Quarterly

C.

Twice a year

D.

Once a year

Questions # 22:

Which of the following is NOT the advantage of proprietary officers?

Options:

A.

Quality of personnel

B.

Loyalty

C.

Impartiality

D.

Prestige

Questions # 23:

Which of the following is NOT the distinct action that fall into invasion of privacy?

Options:

A.

misappropriation of the plaintiff’s name or picture for commercial advantage

B.

placing the plaintiff in the false light

C.

private disclosure of public facts

D.

intrusion into the seclusion of another

Questions # 24:

When preparing a pre-bid conference and ensuring the process is competitive, it is important to select a team representative responsible for the meeting minutes and to record

Options:

A.

the contractors and personnel who attended the conference.

B.

the contractors that completed a walk-through of the location.

C.

the physical conditions and affected buildings and locations.

D.

the project questions and answers given during the conference.

Questions # 25:

When reviewing an Intrusion Detection System (IDS), what type of analysis includes numeric values for probability of detection (PD), the system ' s false alarm rate (FAR), and its nuisance alarm rate (NAR)?

Options:

A.

Practical

B.

Theoretical

C.

Qualitative

D.

Quantitative

Questions # 26:

When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:

Options:

A.

Financial authority

B.

Control authority

C.

Staff authority

D.

Dominance authority

Questions # 27:

The classic triangle frequently referred to in describing the nature of fire consists of:

Options:

A.

heat, fuel, oxygen

B.

heat, light, oxygen

C.

heat, smoke, oxygen

D.

heat, carbon dioxide, oxygen

Questions # 28:

A fence barrier can be penetrated by prying up the bottom of the fabric. The MOST effective approach to preventing this is to

Options:

A.

bury the bottom several inches of the fence in concrete.

B.

increase the strength of the fence fabric.

C.

install a bottom rail, leaving no more than 2 inches of space above the ground.

D.

install razor ribbon along the bottom of the fence.

Questions # 29:

The recommendations of the Task Force on private security include which one of the following?

Options:

A.

a minimum of eight hours of formal pre-assignment training

B.

basic training of a maximum of 32 hours within 2 months of assignment, of which minimum of 16 hours can be supervised on-the-job training.

C.

Both A & B

D.

Neither A nor B

Questions # 30:

Worms take over computer memory and deny its use to legitimate programs.

Options:

A.

True

B.

False

Viewing page 3 out of 12 pages
Viewing questions 21-30 out of questions