ExamGecko
Home Home / ASIS / CPP

ASIS CPP Practice Test - Questions Answers, Page 25

Question list
Search
Search

A critical on-site examination and analysis of a facility to ascertain the present security status and to identify deficiencies or excesses in determining the protection needed to make recommendations to improve overall security is the definition of a(n):

A.
Full-field inspection
A.
Full-field inspection
Answers
B.
Inspection review
B.
Inspection review
Answers
C.
Audit survey
C.
Audit survey
Answers
D.
Security survey
D.
Security survey
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: D

What is a key consideration in a risk analysis or risk assessment process?

A.
Vulnerability to attack
A.
Vulnerability to attack
Answers
B.
Probability of attack
B.
Probability of attack
Answers
C.
Cost
C.
Cost
Answers
D.
Impact to the business if loss occurs
D.
Impact to the business if loss occurs
Answers
E.
Both a and b
E.
Both a and b
Answers
F.
All of the above
F.
All of the above
Answers
Suggested answer: F

From a security perspective, what is the first factor to be considered in facility construction?

A.
The identity of experienced consultants
A.
The identity of experienced consultants
Answers
B.
An effective security plan
B.
An effective security plan
Answers
C.
The building site itself
C.
The building site itself
Answers
D.
An architect with knowledge of physical security
D.
An architect with knowledge of physical security
Answers
E.
None of the above
E.
None of the above
Answers
Suggested answer: C

Which of the following is not correct regarding a security education program?

A.
Many people are naive and trusting.
A.
Many people are naive and trusting.
Answers
B.
All installation personnel must be made aware of the constant threat of breaches of security.
B.
All installation personnel must be made aware of the constant threat of breaches of security.
Answers
C.
Structural aids to security are valueless without active support of all personnel.
C.
Structural aids to security are valueless without active support of all personnel.
Answers
D.
Security consciousness is an inherent state of mind.
D.
Security consciousness is an inherent state of mind.
Answers
E.
None of the above.
E.
None of the above.
Answers
Suggested answer: D

The most vulnerable link in any identification system is:

A.
Poor quality of identification badges
A.
Poor quality of identification badges
Answers
B.
Educational background of security officers
B.
Educational background of security officers
Answers
C.
Not enough security officers assigned to control posts
C.
Not enough security officers assigned to control posts
Answers
D.
Identification cards are too small
D.
Identification cards are too small
Answers
E.
Perfunctory performance of duty
E.
Perfunctory performance of duty
Answers
F.
None of the above
F.
None of the above
Answers
Suggested answer: E

Which of the following is not true in regard to establishing and identifying personnel to control movement?

A.
The identification card should be designed as simply as possible.
A.
The identification card should be designed as simply as possible.
Answers
B.
Detailed instructions should be disseminated as to where, when, and how badges should be worn.
B.
Detailed instructions should be disseminated as to where, when, and how badges should be worn.
Answers
C.
Procedures should be designed to show employees what to do when an identification card or badge is lost.
C.
Procedures should be designed to show employees what to do when an identification card or badge is lost.
Answers
D.
The identification card or badge should be designed in a relatively complicated manner to avoid duplication.
D.
The identification card or badge should be designed in a relatively complicated manner to avoid duplication.
Answers
E.
Prerequisites should be devised and disseminated for reissue.
E.
Prerequisites should be devised and disseminated for reissue.
Answers
Suggested answer: D

The use of a simple codeword or phrase during a normal conversation to alert other security personnel that an authorized person has been forced to vouch for an unauthorized individual is termed:

A.
Code one
A.
Code one
Answers
B.
SOS
B.
SOS
Answers
C.
Security alert
C.
Security alert
Answers
D.
Duress code
D.
Duress code
Answers
E.
Basic alert
E.
Basic alert
Answers
Suggested answer: D

The practice of having at least two authorized persons, each capable of detecting incorrect or unauthorized procedures with respect to the task being performed, present during any operation that affords access to a sensitive area is referred to as a(n):

A.
Two-man access procedure
A.
Two-man access procedure
Answers
B.
Two-man control rule
B.
Two-man control rule
Answers
C.
Two-man rule
C.
Two-man rule
Answers
D.
Controlled access rule
D.
Controlled access rule
Answers
E.
Information security rule
E.
Information security rule
Answers
F.
None of the above
F.
None of the above
Answers
Suggested answer: C

The designation and establishment of 'restricted areas' according to army regulations is performed by the:

A.
Joint Chiefs of Staff
A.
Joint Chiefs of Staff
Answers
B.
National Security Agency
B.
National Security Agency
Answers
C.
The Secretary of Defense
C.
The Secretary of Defense
Answers
D.
The Secretary of the Army
D.
The Secretary of the Army
Answers
E.
The military commander of the installation or facility
E.
The military commander of the installation or facility
Answers
Suggested answer: E

Which of the following is not a known advantage of the establishment of restricted areas?

A.
They provide an increase in security without slowdown in operation.
A.
They provide an increase in security without slowdown in operation.
Answers
B.
They provide increased security through buffer zones.
B.
They provide increased security through buffer zones.
Answers
C.
They allow for varying degrees of security as required.
C.
They allow for varying degrees of security as required.
Answers
D.
They improve overall security.
D.
They improve overall security.
Answers
E.
They make it possible to have security compatible with operational requirements.
E.
They make it possible to have security compatible with operational requirements.
Answers
Suggested answer: A
Total 766 questions
Go to page: of 77