11.11 Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PSP Exam Dumps - Planning & Scheduling Professional (PSP) Exam

Question # 4

The concept of __________ arises from agency law in which one party has the power to control the actions of another party involved in the contract or relationship.

A.

Compliance liability

B.

Vicarious liability

C.

Active liability

D.

Passive liability

Full Access
Question # 5

What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?

A.

Identity fraud

B.

Identity theft

C.

Identity dissemination

D.

Identity Distortion

Full Access
Question # 6

Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?

A.

Transmission Control protocol

B.

File Transfer protocol

C.

Information Control protocol

D.

None of the above

Full Access
Question # 7

What generally means removing the risk to the company by paying for the protection of an insurance policy?

A.

Security

B.

Risk transfer

C.

Collateral

D.

Self-assurance

Full Access
Question # 8

What results from fearing the consequences of being caught; and is a product of reasoning?

A.

Speech honesty

B.

Conditional honesty

C.

Integrity

D.

Conduct

Full Access
Question # 9

_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.

A.

Program Valuation

B.

Risk analysis

C.

Security survey

D.

Performance audit

Full Access
Question # 10

A legal research generally involves locating:

A.

the applicable statute

B.

the applicable case law

C.

related articles in professional journals

D.

All of the above

Full Access
Question # 11

What are restricted as to entrance or movement by all but authorized personnel and vehicles?

A.

Terminal operations

B.

Surveillance

C.

Total programs

D.

Controlled areas

Full Access
Question # 12

Administrative workload is substantially decreased when which service is employed?

A.

Union

B.

Security

C.

Proprietary

D.

Contract

Full Access
Question # 13

Trimming off small amounts of money from many sources and diverting these slices into one’s own or an accomplice’s account is known as:

A.

Manipulation technique

B.

Auction planning

C.

Salami Technique

D.

Hostile applets

Full Access
Question # 14

Which of the following is NOT included in the pass systems?

A.

Single pass system

B.

Multiple pass system

C.

Pass-exchange system

D.

Pass-control system

Full Access
Question # 15

In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.

A.

True

B.

False

Full Access
Question # 16

Some people emerge as experts who then sell their expertise for a fee; these people are commonly referred to as:

A.

Respondents

B.

Consultants

C.

Directors

D.

Professionals

Full Access
Question # 17

Which of the following is NOT the category of signaling systems?

A.

Global

B.

Auxiliary

C.

Remote station

D.

Central station

Full Access
Question # 18

What is a major management function in business worldwide?

A.

Security

B.

Projection

C.

Quality

D.

Mission

Full Access
Question # 19

Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:

A.

Random memory

B.

Scavenging memory

C.

Awaiting memory

D.

Search memory

Full Access
Question # 20

Which alarm warn of a process reaching a dangerous temperature, of the presence of toxic fumes, or that a machine is running too fast?

A.

Burglar alarm

B.

Special-use alarm

C.

Intrusion alarms

D.

Protection alarm

Full Access
Question # 21

WANs also allow multiple computers to share the same communication line, as is possible with LANs.

A.

True

B.

False

Full Access
Question # 22

Businesses have been forced to come to terms with potential consequences of taking security risks and the solution which should be complementary is:

A.

Investment in loss prevention techniques

B.

Insurance

C.

Both A and B

D.

Neither A nor B

Full Access
Question # 23

_______________ of risk involves planning for an eventual loss without benefit of insurance.

A.

Planning

B.

Transfer

C.

locking

D.

Self-assumption

Full Access
Question # 24

Theft triangle consists of:

A.

dander, desire, opportunity

B.

motive, condition, opportunity

C.

motive, desire, opportunity

D.

dishonesty, financial problem, prospect

Full Access
Question # 25

Taking personal property in such a way that the plaintiff’s use or right of possession of chattel is restricted is called:

A.

Restriction

B.

Transfer

C.

Constraint

D.

Conversion

Full Access
Question # 26

The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?

A.

International terrorism

B.

Modern terrorism

C.

Modern Revolutionary

D.

Modern War weapons

Full Access
Question # 27

Communism has common property and radical Islam has sharing property

A.

True

B.

False

Full Access
Question # 28

Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.

A.

Asset standard Act

B.

Material Safety Data Sheet

C.

Procurement Asset Safety Program

D.

Product stability program

Full Access
Question # 29

What have been secured to some extent by limiting access to underground areas?

A.

Maritime operations

B.

Security measures

C.

Terminals

D.

Resealing

Full Access
Question # 30

What is an operational method in which the very act of the attack is dependent upon the death of the perpetrator?

A.

Time bomb attack

B.

Terrorist attack

C.

Suicide attack

Full Access
Question # 31

Critical process recovery requires an assessment of resources.

A.

True

B.

False

Full Access
Question # 32

The central station, local alarm system, auxiliary systems are all currently available systems of:

A.

Alarm monitoring systems

B.

Sonic Alarm systems

C.

Capacitance Alarm systems

D.

Motion detection systems

Full Access
Question # 33

An examination of persons and/or their property for the purpose of discovering evidence of guilt in relation to some specific offense is known as:

A.

Examine

B.

Test

C.

Research

D.

Search

Full Access
Question # 34

A person who already knows and understands the basics of loss prevention and security is known as:

A.

Engaged liaison

B.

Review personnel

C.

Supportive person

D.

None of the above

Full Access
Question # 35

The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:

A.

Analysis

B.

Integrity

C.

Security

D.

Availability

Full Access
Question # 36

The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:

A.

Business continuity

B.

Business recovery

C.

Business resumption

D.

Business healing

Full Access
Question # 37

The introduction of holography into badge control systems reduces the chance of:

A.

Theft

B.

Counterfeiting

C.

Intrusion

D.

Security

Full Access
Question # 38

A solicitation by police officers is another charge that may be leveled against security officers is called:

A.

Criminal liability

B.

Wrongful death

C.

Verdict Act

D.

Entrapment

Full Access
Question # 39

When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:

A.

Innocuous Bug

B.

Catastrophic Virus

C.

Hostile worm

D.

Trojan Horse

Full Access
Question # 40

The concept that accepts the fact that the plaintiff may have contributed to his or her own injury, such as being in a restricted area or creating a disturbance or some hazard is known as:

A.

Control tactics

B.

Comparative fault

C.

Defensive control

D.

None of the above

Full Access
Question # 41

Which approach is dealt with terrorists’ personalities, their recruitment, and their induction into terrorist organizations, beliefs, attitudes, motivations and careers?

A.

Multifactor Approach

B.

Physiological Approach

C.

Violence Approach

D.

Criminal approach

Full Access
Question # 42

What focus on legal principles and theories along with cases in which such principles predominate?

A.

Encyclopedias

B.

Legal document

C.

Formal memorandum

D.

None of the above

Full Access
Question # 43

____________ builds on confusion when two or more people take advantage of their positions and the confusion to steal.

A.

Conspiracy

B.

Accountability

C.

Invoicing

D.

Proliferation

Full Access
Question # 44

Who generally provide an advisory or service function to a line executive?

A.

Chief financial officer

B.

Merchandiser

C.

Staff personnel

D.

Retail marketer

Full Access
Question # 45

WANs used which protocol developed by the Consultative Committee for International Telephone and Telegraph.

A.

X.25

B.

XA.10

C.

CXA 1.23

D.

X.20

Full Access
Question # 46

Which liability is of concern to enterprises that contract or employs security services and is an indirect legal responsibility?

A.

Strict

B.

Negligence

C.

Vicarious

D.

Loose

Full Access
Question # 47

Insurance can be a substitute for a security program.

A.

True

B.

False

Full Access
Question # 48

What considers all aspects of the security operation on a continuing basis?

A.

Security Vulnerability

B.

Data-security Act

C.

Inspection criterion

D.

Operational Audit

Full Access
Question # 49

Which of the following is the category of integrity and lie detection tests?

A.

Polygraph

B.

Psychological Stress Evaluator

C.

Personal Security Inventory

D.

All of the above

Full Access
Question # 50

What is the result of a jurisdiction either using common law, which was adopted from English traditions, or passing specific legislation called statutory law?

A.

Criminal law

B.

Offended suit

C.

Case law

D.

Constitution law

Full Access
Question # 51

Which of the following is NOT the alternative of optimizing risk management?

A.

Risk avoidance

B.

Risk assessment

C.

Risk transfer

D.

Risk spreading

Full Access
Question # 52

__________ is a plant, building, office, institution, or any commercial or industrial structure or complex with all the attendant structures and functions that are part of an integrated operation.

A.

Facility

B.

Contents

C.

Interior

D.

Padlocks

Full Access
Question # 53

When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:

A.

Financial authority

B.

Control authority

C.

Staff authority

D.

Dominance authority

Full Access
Question # 54

_______ requires that the arrestee be turned over to the authorities as soon as practicable and in any event without unreasonable delay.

A.

Arrest

B.

Detain

C.

Detention

D.

Threatening loss

Full Access