ExamGecko
Home / ASIS / CPP
Ask Question

ASIS CPP Practice Test - Questions Answers, Page 25

Question list
Search

Question 241

Report
Export
Collapse

A critical on-site examination and analysis of a facility to ascertain the present security status and to identify deficiencies or excesses in determining the protection needed to make recommendations to improve overall security is the definition of a(n):

Full-field inspection
Full-field inspection
Inspection review
Inspection review
Audit survey
Audit survey
Security survey
Security survey
None of the above
None of the above
Suggested answer: D
asked 16/09/2024
Andrea Chichiarelli
39 questions

Question 242

Report
Export
Collapse

What is a key consideration in a risk analysis or risk assessment process?

Vulnerability to attack
Vulnerability to attack
Probability of attack
Probability of attack
Cost
Cost
Impact to the business if loss occurs
Impact to the business if loss occurs
Both a and b
Both a and b
All of the above
All of the above
Suggested answer: F
asked 16/09/2024
Francisco Rocha de Oliveira Junior
28 questions

Question 243

Report
Export
Collapse

From a security perspective, what is the first factor to be considered in facility construction?

The identity of experienced consultants
The identity of experienced consultants
An effective security plan
An effective security plan
The building site itself
The building site itself
An architect with knowledge of physical security
An architect with knowledge of physical security
None of the above
None of the above
Suggested answer: C
asked 16/09/2024
Vo Quoc Bao
35 questions

Question 244

Report
Export
Collapse

Which of the following is not correct regarding a security education program?

Many people are naive and trusting.
Many people are naive and trusting.
All installation personnel must be made aware of the constant threat of breaches of security.
All installation personnel must be made aware of the constant threat of breaches of security.
Structural aids to security are valueless without active support of all personnel.
Structural aids to security are valueless without active support of all personnel.
Security consciousness is an inherent state of mind.
Security consciousness is an inherent state of mind.
None of the above.
None of the above.
Suggested answer: D
asked 16/09/2024
Henrik Persson
34 questions

Question 245

Report
Export
Collapse

The most vulnerable link in any identification system is:

Poor quality of identification badges
Poor quality of identification badges
Educational background of security officers
Educational background of security officers
Not enough security officers assigned to control posts
Not enough security officers assigned to control posts
Identification cards are too small
Identification cards are too small
Perfunctory performance of duty
Perfunctory performance of duty
None of the above
None of the above
Suggested answer: E
asked 16/09/2024
Gopakumar Nair
39 questions

Question 246

Report
Export
Collapse

Which of the following is not true in regard to establishing and identifying personnel to control movement?

The identification card should be designed as simply as possible.
The identification card should be designed as simply as possible.
Detailed instructions should be disseminated as to where, when, and how badges should be worn.
Detailed instructions should be disseminated as to where, when, and how badges should be worn.
Procedures should be designed to show employees what to do when an identification card or badge is lost.
Procedures should be designed to show employees what to do when an identification card or badge is lost.
The identification card or badge should be designed in a relatively complicated manner to avoid duplication.
The identification card or badge should be designed in a relatively complicated manner to avoid duplication.
Prerequisites should be devised and disseminated for reissue.
Prerequisites should be devised and disseminated for reissue.
Suggested answer: D
asked 16/09/2024
Piotr Szwajkowski
39 questions

Question 247

Report
Export
Collapse

The use of a simple codeword or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is termed:

Code one
Code one
SOS
SOS
Security alert
Security alert
Duress code
Duress code
Basic alert
Basic alert
Suggested answer: D
asked 16/09/2024
KENEILWE DITHLAGE
42 questions

Question 248

Report
Export
Collapse

The practice of having at least two authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed, present during any operation that affords access to a sensitive area is referred to as a(n):

Two-man access procedure
Two-man access procedure
Two-man control rule
Two-man control rule
Two-man rule
Two-man rule
Controlled access rule
Controlled access rule
Information security rule
Information security rule
None of the above
None of the above
Suggested answer: C
asked 16/09/2024
Stephen McMahon
33 questions

Question 249

Report
Export
Collapse

The designation and establishment of 'restricted areas' according to army regulations is performed by the:

Joint Chiefs of Staff
Joint Chiefs of Staff
National Security Agency
National Security Agency
The Secretary of Defense
The Secretary of Defense
The Secretary of the Army
The Secretary of the Army
The military commander of the installation or facility
The military commander of the installation or facility
Suggested answer: E
asked 16/09/2024
Priya Ketkar
36 questions

Question 250

Report
Export
Collapse

Which of the following is not a known advantage of the establishment of restricted areas?

They provide an increase in security without slowdown in operation.
They provide an increase in security without slowdown in operation.
They provide increased security through buffer zones.
They provide increased security through buffer zones.
They allow for varying degrees of security as required.
They allow for varying degrees of security as required.
They improve overall security.
They improve overall security.
They make it possible to have security compatible with operational requirements.
They make it possible to have security compatible with operational requirements.
Suggested answer: A
asked 16/09/2024
David Wilson
39 questions
Total 766 questions
Go to page: of 77