Black Friday Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtick70

PSP Planning & Scheduling Professional (PSP) Exam Questions and Answers

Questions 4

Unintentional access to software code is referred to as:

Options:

A.

Bomb

B.

Trapdoor

C.

Backdoor

D.

Trojan Horse

Buy Now
Questions 5

What must be accomplished to accurately determine the financial and operational impact that could result from an interruption of enterprise operations?

Options:

A.

Enterprise impact analysis

B.

Managerial impact analysis

C.

Critical process impact

D.

Business impact analysis

Buy Now
Questions 6

Private security functions are not essentially client orientated; public law enforcement functions are society or community oriented.

Options:

A.

True

B.

False

Buy Now
Questions 7

In its organizational functions, security encompasses which basic activities with varying degrees of emphasis?

Options:

A.

managerial, detective, preventive, investigative

B.

supervising, administrative, preventive, training

C.

managerial, training, preventive, detective

D.

managerial, administrative, preventive, investigative

Buy Now
Questions 8

What have been secured to some extent by limiting access to underground areas?

Options:

A.

Maritime operations

B.

Security measures

C.

Terminals

D.

Resealing

Buy Now
Questions 9

Which of the following is NOT included in the pass systems?

Options:

A.

Single pass system

B.

Multiple pass system

C.

Pass-exchange system

D.

Pass-control system

Buy Now
Questions 10

What are used only for handling and storing high-value cargo?

Options:

A.

Limited areas

B.

Exclusion areas

C.

Multiple areas

D.

None of the above

Buy Now
Questions 11

A study of BDP international has found that ___________ of shippers are factoring in additional time to comply with the Advanced Manifest System, which went into effect in February 2003. This Department of Homeland security rule requires the filing of complete import manifest documentation at least 24 hours before U.S.-bound ships are loaded at foreign ports.

Options:

A.

30 percent

B.

25 perc

C.

35 percent

D.

40 percent

Buy Now
Questions 12

A good hybrid security operation consists of which component?

Options:

A.

engaged corporate liaison

B.

consistent contract management support

C.

accurate quality measurements

D.

All of the above

Buy Now
Questions 13

Which of the following is the type of comparative negligence statute?

Options:

A.

Pure approach

B.

50/50 rule

C.

51 percent rule

D.

All of the above

Buy Now
Questions 14

From a management point of view, organizing the security effort involves:

Options:

A.

Planning & goal setting

B.

Establishing controls

C.

Hiring personnel

D.

All of the above

Buy Now
Questions 15

In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.

Options:

A.

True

B.

False

Buy Now
Questions 16

When yard space and warehousing is required even in urban areas, __________ is the boundary of the property owned by the company.

Options:

A.

Fence

B.

Wall

C.

Perimeter

D.

Chain link

Buy Now
Questions 17

What allows people to log on to a remote computer and use the resources of that system if they have a valid account?

Options:

A.

Cabinet

B.

Telnet

C.

Telecom

D.

None of the above

Buy Now
Questions 18

WANs also allow multiple computers to share the same communication line, as is possible with LANs.

Options:

A.

True

B.

False

Buy Now
Questions 19

Which liability is of concern to enterprises that contract or employs security services and is an indirect legal responsibility?

Options:

A.

Strict

B.

Negligence

C.

Vicarious

D.

Loose

Buy Now
Questions 20

Which of the following is NOT the distinct action that fall into invasion of privacy?

Options:

A.

misappropriation of the plaintiff’s name or picture for commercial advantage

B.

placing the plaintiff in the false light

C.

private disclosure of public facts

D.

intrusion into the seclusion of another

Buy Now
Questions 21

A hybrid system is a combination of:

Options:

A.

Security & Control

B.

Standard & Security acts

C.

Security consultants & services

D.

Proprietary & Contract security

Buy Now
Questions 22

The relationship between the two groups continues to be strained because of which key issue?

Options:

A.

Perceived competition

B.

Provision of services in borderline of responsibility

C.

Moonlight policies for public police

D.

All of the above

Buy Now
Questions 23

What is an operational method in which the very act of the attack is dependent upon the death of the perpetrator?

Options:

A.

Time bomb attack

B.

Terrorist attack

C.

Suicide attack

Buy Now
Questions 24

Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.

Options:

A.

business continuity, business recovery

B.

business recovery, business resumption

C.

business recovery, business continuity

D.

business continuity, business resources

Buy Now
Questions 25

A concept that has grown largely in response to the difficulties faced by merchants in protecting their property from shoplifters and the problems and dangers they face when they make an asset, is called:

Options:

A.

Release

B.

Confinement

C.

Detention

D.

None of the above

Buy Now
Questions 26

When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:

Options:

A.

Innocuous Bug

B.

Catastrophic Virus

C.

Hostile worm

D.

Trojan Horse

Buy Now
Questions 27

Ideally a business should have four sets of backup files;

Options:

A.

with one set of files staying on-site and three sets of files being stored off-site

B.

with two of files staying on-site and two sets of files being stored off-site

C.

with three set of files staying on-site and one set of files being stored off-site

D.

with four set of files staying on-site and no set of files being stored off-site

Buy Now
Questions 28

Under the principle of agency law, such an assignment transfers the liability for the service from the corporation to the independent contractor with obligations that some cannot be entirely transferred, is called:

Options:

A.

Non-delegable duty

B.

Delegable duty

C.

Non-Crime duty

D.

None of the above

Buy Now
Questions 29

Contingency planning is the result of which four major components?

Options:

A.

emergency response, crisis management, pressure devices, risk analysis

B.

emergency response, crisis management, business recovery, business resumption

C.

basic planning, crisis management, business recovery, business resumption

D.

under investigation, crisis management, business recovery, pressure devices

Buy Now
Questions 30

IP sends information across networks in packets, each containing between 1 and approximately:

Options:

A.

1,000 characters

B.

12, 00 characters

C.

15, 00 characters

D.

18, 00 characters

Buy Now
Questions 31

Which of the following is NOT the organizational level of international terrorism?

Options:

A.

Individual terrorism

B.

Modern terrorism

C.

Group terrorism

D.

State terrorism

Buy Now
Questions 32

WANs used which protocol developed by the Consultative Committee for International Telephone and Telegraph.

Options:

A.

X.25

B.

XA.10

C.

CXA 1.23

D.

X.20

Buy Now
Questions 33

Which approach is dealt with terrorists’ personalities, their recruitment, and their induction into terrorist organizations, beliefs, attitudes, motivations and careers?

Options:

A.

Multifactor Approach

B.

Physiological Approach

C.

Violence Approach

D.

Criminal approach

Buy Now
Questions 34

The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.

Options:

A.

True

B.

False

Buy Now
Questions 35

What is the authorized physical invasion of property or remaining on property after permission has been rescinded?

Options:

A.

Prosecution

B.

Trespass

C.

Verdict

D.

None of the above

Buy Now
Questions 36

To deal with the lack of security, both government organizations have developed guidelines for protecting electric facilities and distribution systems. On the private side, the Edison Electric Institute developed guidelines that have been passed on to the North American Electric Reliability Council (NERC), the U.S. Department of Energy’s coordinator for the U.S. electrical infrastructure. Among other things the guide lines cover:

Options:

A.

Vulnerability/risk analysis

B.

Threat response

C.

Cyber scenario

D.

Emergency detection

Buy Now
Questions 37

Which of eth following is NOT the type of insurance?

Options:

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Privacy Invasion

Buy Now
Questions 38

The central station, local alarm system, auxiliary systems are all currently available systems of:

Options:

A.

Alarm monitoring systems

B.

Sonic Alarm systems

C.

Capacitance Alarm systems

D.

Motion detection systems

Buy Now
Questions 39

Critical process recovery requires an assessment of resources.

Options:

A.

True

B.

False

Buy Now
Questions 40

The individual who commits a tort is called a tort-feasor, where as the injured party is called the plaintiff.

Options:

A.

True

B.

False

Buy Now
Questions 41

Communism has common property and radical Islam has sharing property

Options:

A.

True

B.

False

Buy Now
Questions 42

The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?

Options:

A.

International terrorism

B.

Modern terrorism

C.

Modern Revolutionary

D.

Modern War weapons

Buy Now
Questions 43

What involves a discreet investigation into the past and present activities of the applicant?

Options:

A.

Back-grounding

B.

Reporting

C.

Supervisory

D.

Recording

Buy Now
Questions 44

What is the result of a jurisdiction either using common law, which was adopted from English traditions, or passing specific legislation called statutory law?

Options:

A.

Criminal law

B.

Offended suit

C.

Case law

D.

Constitution law

Buy Now
Questions 45

____________ builds on confusion when two or more people take advantage of their positions and the confusion to steal.

Options:

A.

Conspiracy

B.

Accountability

C.

Invoicing

D.

Proliferation

Buy Now
Questions 46

Tapping without authorization into communication lines over which digitized computer data and messages are being sent is called:

Options:

A.

Electronic eavesdropping

B.

War driving

C.

Digital beating

D.

Standard digitizing

Buy Now
Questions 47

The recommendations of the Task Force on private security include which one of the following?

Options:

A.

a minimum of eight hours of formal pre-assignment training

B.

basic training of a maximum of 32 hours within 2 months of assignment, of which minimum of 16 hours can be supervised on-the-job training.

C.

Both A & B

D.

Neither A nor B

Buy Now
Questions 48

Which of the following is NOT the advantage of proprietary officers?

Options:

A.

Quality of personnel

B.

Loyalty

C.

Impartiality

D.

Prestige

Buy Now
Questions 49

Which of the following is the most widely accepted classification of skills for the leadership?

Options:

A.

Skill Mix

B.

Conceptual

C.

Human relations

D.

All of the above

Buy Now
Questions 50

A system in which installation circuits are connected to local police or fire departments or 911 centers by leased telephone lines is called;

Options:

A.

Central station

B.

Proprietary system

C.

Local alarm system

D.

Auxiliary system

Buy Now
Questions 51

Which of the following is NOT the category of signaling systems?

Options:

A.

Global

B.

Auxiliary

C.

Remote station

D.

Central station

Buy Now
Questions 52

Which of the following is NOT the alternative of optimizing risk management?

Options:

A.

Risk avoidance

B.

Risk assessment

C.

Risk transfer

D.

Risk spreading

Buy Now
Questions 53

_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.

Options:

A.

Physical security

B.

Network Security Policy

C.

Forensic investigations

D.

Spam filtering

Buy Now
Questions 54

Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.

Options:

A.

True

B.

False

Buy Now
Exam Code: PSP
Exam Name: Planning & Scheduling Professional (PSP) Exam
Last Update: Nov 24, 2024
Questions: 120
PSP pdf

PSP PDF

$25.5  $84.99
PSP Engine

PSP Testing Engine

$30  $99.99
PSP PDF + Engine

PSP PDF + Testing Engine

$40.5  $134.99