Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the ASIS Physical Security Professional ASIS-PSP Questions and answers with Dumpstech

Exam ASIS-PSP Premium Access

View all detail and faqs for the ASIS-PSP exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions
Questions # 51:

One example of a company’s intangible assets would be its:

Options:

A.

Patents

B.

Reputation

C.

Digital files

D.

Obsolete equipment

Questions # 52:

The computers those are capable of great processing speed and data storage, allowing multiple users to utilize the system simultaneously is called:

Options:

A.

Workstations

B.

Main computers

C.

Supercomputers

D.

Mainframes

Questions # 53:

A design that is applied to a lock keyway to make picking of the lock more difficult is known as

Options:

A.

spool.

B.

mushroom.

C.

paracentric.

D.

serrated.

Questions # 54:

Which of the following processes should be implemented in addition to a risk assessment when considering how a potentially disruptive event can negatively affect a facility ' s security program?

Options:

A.

Adversary Route

B.

After Action Report

C.

Critical Event Review

D.

Business Impact Analysis

Questions # 55:

Decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss is called:

Options:

A.

Risk diffusion

B.

Risk production

C.

Risk spreading

D.

Risk protection

Questions # 56:

A device that sends a signal about whatever is sensed to some other location is called:

Options:

A.

Signal device

B.

Circuit device

C.

Wave device

D.

Line device

Questions # 57:

Criteria for intrusion sensor performance is typically measured by which of the following?

Options:

A.

Alarm rate probability, nuisance alarm rate, and vulnerability to defeat

B.

Probability to detect, nuisance alarm rate, and vulnerability assessment

C.

Alarm rate probability, annunciation rate, and vulnerability to defeat

D.

Probability to detect, nuisance alarm rate, and vulnerability to defeat

Questions # 58:

The process of pre-qualifying vendors before issuing the request for proposal (RFP) helps to ensure that:

Options:

A.

All applicable codes are enforced

B.

Only credible and competent vendors bid on the project

C.

Only financially secure vendors bid on the project

D.

All specifications of the project are met

Questions # 59:

The concept that accepts the fact that the plaintiff may have contributed to his or her own injury, such as being in a restricted area or creating a disturbance or some hazard is known as:

Options:

A.

Control tactics

B.

Comparative fault

C.

Defensive control

D.

None of the above

Questions # 60:

A project specification includes, but is not limited to, system requirements that identify

Options:

A.

the cost of the installed system.

B.

testing specifications.

C.

equipment tolerances.

D.

performance expectations.

Viewing page 6 out of 12 pages
Viewing questions 51-60 out of questions