ASIS-CPP Certified Protection Professional (CPP) Exam Questions and Answers
Which of the following is one step in the risk assessment process for use in protecting information?
An organization ' s Chief Executive Officer (CEO) wants to expand surveillance technology at their main distribution center as part of an employee theft and misconduct reduction initiative. Which of the following should the security management team advise the CEO of regarding privacy considerations?
Performing a vulnerability analysis, selecting and installing countermeasures, and testing the operating program are three general steps in the:
In order to perform a logical risk analysis, it is first necessary to identify the assets in need of being protected, identify the kinds of risks that may affect the involved assets, determine the probability of the risk occurrence, and determine the;
Which of the following provides the basis in a contract to evaluate return on investment?
When managing an investigative unit, the best way to obtain favorable support for budget requests is to:
Which security program emphasizes a continuing attitude that can move an individual to take specific actions to report or decrease security risks?
An indication of deception by a suspect during the interviewing process would be:
Which of the following surveys should be conducted to determine the effectiveness of risk controls and justify their placement within the security budget?
In addition to utilizing state-of-the-art locking devices, electronic surveillance, and spaces designed to maximize effective use by intended users, what other CPTED strategies can be used to enhance a security system?
During an investigation of embezzlement, there is a need to review the accounts payable ledger This accounting record should contain the;
In which of the following areas are traditional police responsibilities increasingly shared with private security?
When all risks have been identified and specific points established for each, what must be developed next?
A security professional is designing a CCTV system to monitor activity in an employee parking lot that is 2,200 feet from the monitoring station. Which type of cable will best transmit the signal?
A common misconception about Enterprise Security Risk Management (ESRM) is that it is the same as Enterprise Risk Management (ERM). which covers all risk for the business. What is the other misconception?
Which security program emphasizes a continuing attitude that can move an individual to take specific actions to report or decrease security risks?
A newly hired corporate investigator is conducting interviews to collect information and determine who is responsible for the loss of a missing company laptop from a desk in the shipping and receiving department. At what point must the investigator start observing non-verbal responses?
Which of the following can be used to authenticate and authorize computer access?
Which type of sensor creates an electrical field around metallic objects that signals an alarm when activated?
Which of the following terms best describes when a person ' s tissue cells have adjusted to the presence of a drug?
While conducting an executive protection risk assessment, the executive protection specialist should focus on what two areas in order to rate the risks?
The criterion that serves as the basis for rating fire-resistant document containers exposed to heat for varying periods of time is the:
To be considered a trade secret, information must meet all of the following criteria EXCEPT:
For access control purposes, it is helpful to divide the high-rise structure into which three classes or types of interior spaces?
Which is most true of corporate misconduct such as workplace violence, substance abuse, and employee theft?
In the management of an incident, which group has the capability to make informed decisions using available information?
What two areas are the most likely forms of dishonesty a security professional will most likely encounter?
To conduct the job analysis, it is necessary to define the positions within the security department and identify the:
For large commercial and industrial enterprises, the need to resume normal operations as quickly as possible after a disaster is:
During restoration of electrical power after a brief power outage, which of the following types of lighting takes the least time to attain full brilliance?
Which of the following tools can greatly enhance the security of wireless communications?
The agreement prohibiting an employee from disclosing confidential information for a stated period of time after accepting employment with a defined competitor is called a:
When planning for emergency situations, the best strategy to ensure adequate record recovery is to:
With special provisions and approvals from the authority having jurisdiction, it is acceptable for " delayed exit " devices to have which of the following maximum ranges of locking time?
Which term describes a limited simu-lation used to test a business continuity plan?
A correct statement about technical security countermeasures (TSCM) is that they:
To reduce conflict between public law enforcement and private security, the two should work together to:
