Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PSP Questions and Answers

Question # 6

_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.

A.

Physical security

B.

Network Security Policy

C.

Forensic investigations

D.

Spam filtering

Full Access
Question # 7

What is the authorized physical invasion of property or remaining on property after permission has been rescinded?

A.

Prosecution

B.

Trespass

C.

Verdict

D.

None of the above

Full Access
Question # 8

What must be thought of as supportive of security operations rather than as the principal defense?

A.

Insurance

B.

Loss-prevention

C.

Premiums

D.

Bonds

Full Access
Question # 9

Who generally provide an advisory or service function to a line executive?

A.

Chief financial officer

B.

Merchandiser

C.

Staff personnel

D.

Retail marketer

Full Access
Question # 10

Which of the following is NOT included in the pass systems?

A.

Single pass system

B.

Multiple pass system

C.

Pass-exchange system

D.

Pass-control system

Full Access
Question # 11

Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.

A.

True

B.

False

Full Access
Question # 12

When using ____________, computers must ensure that there is no traffic on the network before they are allowed to transmit information.

A.

File Transfer protocol

B.

Buses

C.

Ethernet protocol

D.

None of the above

Full Access
Question # 13

A system of discussion groups in which individual articles are distributed throughout the world is called:

A.

Usenet

B.

Telnet

C.

Widespread net

D.

Web net

Full Access
Question # 14

Which of the following is NOT the advantage of contract services?

A.

Control

B.

Administration

C.

Staffing

D.

Expertise

Full Access
Question # 15

What results from fearing the consequences of being caught; and is a product of reasoning?

A.

Speech honesty

B.

Conditional honesty

C.

Integrity

D.

Conduct

Full Access
Question # 16

WANs used which protocol developed by the Consultative Committee for International Telephone and Telegraph.

A.

X.25

B.

XA.10

C.

CXA 1.23

D.

X.20

Full Access
Question # 17

Under 50/50 rule of comparative negligence, the plaintiff can collect for damages if he or she was responsible for more or less than 50 percentage of the negligence.

A.

True

B.

False

Full Access
Question # 18

Document the events, circumstances, and chronology and prepare a “lesson learned” review are the primary parts of:

A.

Testing

B.

Quality assurance

C.

After action

D.

All of the above

Full Access
Question # 19

Which of the following is NOT the activity and concern of a crisis management plan?

A.

Crisis management team

B.

Disaster operation

C.

Media operation

D.

Vital records

Full Access
Question # 20

Advice commonly purchased from consultant consists of which of the following information?

A.

Number, quantity, and use of security personnel

B.

Direction and content of security policies and procedures

C.

Alternatives in security hardware

D.

All of the above

Full Access
Question # 21

Which department has total supervision over a firm’s money and will generally be the area most vulnerable to major loss due to crime?

A.

Accounting

B.

Data-Processing

C.

Purchasing

D.

Shipping and Receiving

Full Access
Question # 22

Under the principle of agency law, such an assignment transfers the liability for the service from the corporation to the independent contractor with obligations that some cannot be entirely transferred, is called:

A.

Non-delegable duty

B.

Delegable duty

C.

Non-Crime duty

D.

None of the above

Full Access
Question # 23

Administrative workload is substantially decreased when which service is employed?

A.

Union

B.

Security

C.

Proprietary

D.

Contract

Full Access
Question # 24

WANs also allow multiple computers to share the same communication line, as is possible with LANs.

A.

True

B.

False

Full Access
Question # 25

The concept of __________ arises from agency law in which one party has the power to control the actions of another party involved in the contract or relationship.

A.

Compliance liability

B.

Vicarious liability

C.

Active liability

D.

Passive liability

Full Access
Question # 26

The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:

A.

Analysis

B.

Integrity

C.

Security

D.

Availability

Full Access
Question # 27

What implies that the confinement is for personal advantage rather than to bring the plaintiff to court?

A.

Battery

B.

Confinement

C.

False imprisonment

D.

None of the above

Full Access
Question # 28

A system that is independently owned and operated by an alarm company is known as:

A.

Warning system

B.

Main system

C.

Central station system

D.

Alarm system

Full Access
Question # 29

What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?

A.

Strict liability

B.

Plaintiff

C.

Defendant

D.

None of the above

Full Access
Question # 30

When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:

A.

Financial authority

B.

Control authority

C.

Staff authority

D.

Dominance authority

Full Access
Question # 31

In its organizational functions, security encompasses which basic activities with varying degrees of emphasis?

A.

managerial, detective, preventive, investigative

B.

supervising, administrative, preventive, training

C.

managerial, training, preventive, detective

D.

managerial, administrative, preventive, investigative

Full Access
Question # 32

Premeditated, politically motivated violence perpetrated against noncombatant targets by sub-national groups or clandestine agents, usually intended to influence an audience is called:

A.

Theft

B.

Terrorism

C.

Violence

D.

Criminal approach

Full Access
Question # 33

The concept that accepts the fact that the plaintiff may have contributed to his or her own injury, such as being in a restricted area or creating a disturbance or some hazard is known as:

A.

Control tactics

B.

Comparative fault

C.

Defensive control

D.

None of the above

Full Access
Question # 34

The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:

A.

Business continuity

B.

Business recovery

C.

Business resumption

D.

Business healing

Full Access
Question # 35

What have been secured to some extent by limiting access to underground areas?

A.

Maritime operations

B.

Security measures

C.

Terminals

D.

Resealing

Full Access
Question # 36

Detention differs from arrest in that it permits a merchant to detain a suspected shoplifter briefly without turning the suspect over to the police.

A.

True

B.

False

Full Access
Question # 37

What not only reflect an applicant’s financial situation and stability, they also provide other useful solution such as past addresses and previous employers?

A.

Legal reports

B.

Credit reports

C.

Status reports

D.

Miscellaneous reports

Full Access
Question # 38

The central station, local alarm system, auxiliary systems are all currently available systems of:

A.

Alarm monitoring systems

B.

Sonic Alarm systems

C.

Capacitance Alarm systems

D.

Motion detection systems

Full Access
Question # 39

Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.

A.

True

B.

False

Full Access
Question # 40

A voluntary and intentional violation by a legally competent parson of a legal duty that commands or prohibits an act for the protection of society is known as:

A.

Corruption

B.

Law-breaking

C.

Fault

D.

Crime

Full Access
Question # 41

What can be used as servers and do not require special installation?

A.

Workstations

B.

Minicomputers

C.

Supercomputers

D.

None of the above

Full Access
Question # 42

Tapping without authorization into communication lines over which digitized computer data and messages are being sent is called:

A.

Electronic eavesdropping

B.

War driving

C.

Digital beating

D.

Standard digitizing

Full Access
Question # 43

Which of the following is NOT the organizational level of international terrorism?

A.

Individual terrorism

B.

Modern terrorism

C.

Group terrorism

D.

State terrorism

Full Access
Question # 44

When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:

A.

Innocuous Bug

B.

Catastrophic Virus

C.

Hostile worm

D.

Trojan Horse

Full Access
Question # 45

A primary ingredient that represents the loss prevention specialist’s opportunity to reduce theft is called:

A.

Low deterrence

B.

Confusion

C.

Common denominator

D.

Reduced Pilfering

Full Access
Question # 46

The amount of force may be equal to, but not greater than, the force is being used against them, this phenomenon is called:

A.

Security

B.

Protection

C.

Self-defense

D.

Precautions

Full Access
Question # 47

Which records provide detailed, documented records of an applicant’s personal history, background, and financial relationships?

A.

Legal action

B.

Civil lawsuit

C.

Civil litigation

D.

All of the above

Full Access
Question # 48

__________ is internationally causing fear of imminent harmful or offensive touching but without touching or physical contact.

A.

Assault

B.

Stabbing

C.

Battering

D.

None of the above

Full Access
Question # 49

A legal research generally involves locating:

A.

the applicable statute

B.

the applicable case law

C.

related articles in professional journals

D.

All of the above

Full Access
Question # 50

Removing the problem by eliminating the risk is known as:

A.

Risk avoidance

B.

Risk prevention

C.

Risk reduction

D.

Risk elimination

Full Access
Question # 51

What considers all aspects of the security operation on a continuing basis?

A.

Security Vulnerability

B.

Data-security Act

C.

Inspection criterion

D.

Operational Audit

Full Access
Question # 52

LANs and WANs can communicate with each other using a communications rule called:

A.

Ethernet Protocol packet

B.

Protocol Assembly packet

C.

XOP.210 Protocol packet

D.

Internet Protocol packet

Full Access
Question # 53

In which ingredients are added to the loss prevention function one by one as the need arises, without a comprehensive plan, is called:

A.

Piecemeal security

B.

Small relative security

C.

Detached security

D.

Independent security

Full Access
Question # 54

A system in which a badge or pass coded for authorization to enter specific areas is issued to an employee, who keeps it until the authorization id changed or until he or she leaves the company is called:

A.

Single pass system

B.

Contractive pass system

C.

Pass-exchange system

D.

None of the above

Full Access