Winter Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

AACE International PSP Dumps

Page: 1 / 12
Total 120 questions

Planning & Scheduling Professional (PSP) Exam Questions and Answers

Question 1

In which approach of comparative negligence, the plaintiff may collect something for injuries even if he or she was primarily responsible for the injuries?

Options:

A.

Pure approach

B.

50/50 rule

C.

51 percent rule

D.

None of the above

Question 2

Detention differs from arrest in that it permits a merchant to detain a suspected shoplifter briefly without turning the suspect over to the police.

Options:

A.

True

B.

False

Question 3

_______________ of risk involves planning for an eventual loss without benefit of insurance.

Options:

A.

Planning

B.

Transfer

C.

locking

D.

Self-assumption

Question 4

A set of unwanted instructions executed on a computer and resulting in a variety of effects is called:

Options:

A.

Virus

B.

Worm

C.

Bug

D.

All of the above

Question 5

Tapping without authorization into communication lines over which digitized computer data and messages are being sent is called:

Options:

A.

Electronic eavesdropping

B.

War driving

C.

Digital beating

D.

Standard digitizing

Question 6

A complete contingency planning program has which of the following major elements?

Options:

A.

Emergency response

B.

Crisis management

C.

Business continuity

D.

All of the above

Question 7

The moment the fire begins, when fuel, air, and an ignition source all come together at the right rate for the correct period of time id called:

Options:

A.

Free burning

B.

Ignition stage

C.

Pyrolysis stage

D.

Incipient stage

Question 8

Contingency planning is the result of which four major components?

Options:

A.

emergency response, crisis management, pressure devices, risk analysis

B.

emergency response, crisis management, business recovery, business resumption

C.

basic planning, crisis management, business recovery, business resumption

D.

under investigation, crisis management, business recovery, pressure devices

Question 9

A primary ingredient that represents the loss prevention specialist’s opportunity to reduce theft is called:

Options:

A.

Low deterrence

B.

Confusion

C.

Common denominator

D.

Reduced Pilfering

Question 10

The computers those are capable of great processing speed and data storage, allowing multiple users to utilize the system simultaneously is called:

Options:

A.

Workstations

B.

Main computers

C.

Supercomputers

D.

Mainframes

Question 11

A system of discussion groups in which individual articles are distributed throughout the world is called:

Options:

A.

Usenet

B.

Telnet

C.

Widespread net

D.

Web net

Question 12

Businesses have been forced to come to terms with potential consequences of taking security risks and the solution which should be complementary is:

Options:

A.

Investment in loss prevention techniques

B.

Insurance

C.

Both A and B

D.

Neither A nor B

Question 13

Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.

Options:

A.

Asset standard Act

B.

Material Safety Data Sheet

C.

Procurement Asset Safety Program

D.

Product stability program

Question 14

Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.

Options:

A.

True

B.

False

Question 15

Removing the problem by eliminating the risk is known as:

Options:

A.

Risk avoidance

B.

Risk prevention

C.

Risk reduction

D.

Risk elimination

Question 16

Those who are delegated authority in the direct chain of command to accomplish specific organizational objectives are known as:

Options:

A.

Management

B.

Authorized directives

C.

Line executives

D.

Stockholders

Question 17

Which of eth following is NOT the type of insurance?

Options:

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Privacy Invasion

Question 18

Which liability is of concern to enterprises that contract or employs security services and is an indirect legal responsibility?

Options:

A.

Strict

B.

Negligence

C.

Vicarious

D.

Loose

Question 19

Which of the following is the most widely accepted classification of skills for the leadership?

Options:

A.

Skill Mix

B.

Conceptual

C.

Human relations

D.

All of the above

Question 20

A civil action based on the principle that one individual can expect certain behavior from another individual is known as:

Options:

A.

Transitivity

B.

Tort

C.

Reassembly

D.

Procurement

Question 21

In ___________, air has been reduced or fuel is dwindling to the point where there is no visible flame, just an entire area filled with tremendous heat.

Options:

A.

Smoldering burning

B.

Ignition stage

C.

Last stage

D.

Incipient stage

Question 22

Private sector will become increasingly involve in crime prevention; public law enforcement will then be free to concentrate more heavily on violent crimes and crime response.

Options:

A.

True

B.

False

Question 23

Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:

Options:

A.

Random memory

B.

Scavenging memory

C.

Awaiting memory

D.

Search memory

Question 24

____________ includes self-employed individuals and funded business entities and organizations providing security-related services to specific clientele for a fee.

Options:

A.

Public security

B.

Private security

C.

Security firm

D.

Security function

Question 25

What is a major management function in business worldwide?

Options:

A.

Security

B.

Projection

C.

Quality

D.

Mission

Question 26

Which of the following is NOT the organizational level of international terrorism?

Options:

A.

Individual terrorism

B.

Modern terrorism

C.

Group terrorism

D.

State terrorism

Question 27

The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?

Options:

A.

International terrorism

B.

Modern terrorism

C.

Modern Revolutionary

D.

Modern War weapons

Question 28

Which records provide detailed, documented records of an applicant’s personal history, background, and financial relationships?

Options:

A.

Legal action

B.

Civil lawsuit

C.

Civil litigation

D.

All of the above

Question 29

What are restricted as to entrance or movement by all but authorized personnel and vehicles?

Options:

A.

Terminal operations

B.

Surveillance

C.

Total programs

D.

Controlled areas

Question 30

What results from fearing the consequences of being caught; and is a product of reasoning?

Options:

A.

Speech honesty

B.

Conditional honesty

C.

Integrity

D.

Conduct

Question 31

What can be used as servers and do not require special installation?

Options:

A.

Workstations

B.

Minicomputers

C.

Supercomputers

D.

None of the above

Question 32

What must be accomplished to accurately determine the financial and operational impact that could result from an interruption of enterprise operations?

Options:

A.

Enterprise impact analysis

B.

Managerial impact analysis

C.

Critical process impact

D.

Business impact analysis

Question 33

A system in which a badge or pass coded for authorization to enter specific areas is issued to an employee, who keeps it until the authorization id changed or until he or she leaves the company is called:

Options:

A.

Single pass system

B.

Contractive pass system

C.

Pass-exchange system

D.

None of the above

Question 34

Who developed Ethernet?

Options:

A.

Xeror Corporation

B.

IBM

C.

Microsoft

D.

None of the above

Question 35

The division of several area programmed supervision results in a aggregate operational audit, and aggregate operational audit considered in aggregate are an entire company’s programmed supervision.

Options:

A.

True

B.

False

Question 36

The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.

Options:

A.

True

B.

False

Question 37

Theft triangle consists of:

Options:

A.

dander, desire, opportunity

B.

motive, condition, opportunity

C.

motive, desire, opportunity

D.

dishonesty, financial problem, prospect

Question 38

___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.

Options:

A.

Potential

B.

Capability

C.

Honesty

D.

Aptitude

Question 39

What are used only for handling and storing high-value cargo?

Options:

A.

Limited areas

B.

Exclusion areas

C.

Multiple areas

D.

None of the above

Question 40

Which of the following is the category of integrity and lie detection tests?

Options:

A.

Polygraph

B.

Psychological Stress Evaluator

C.

Personal Security Inventory

D.

All of the above

Question 41

A system that is independently owned and operated by an alarm company is known as:

Options:

A.

Warning system

B.

Main system

C.

Central station system

D.

Alarm system

Question 42

An examination of persons and/or their property for the purpose of discovering evidence of guilt in relation to some specific offense is known as:

Options:

A.

Examine

B.

Test

C.

Research

D.

Search

Question 43

Decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss is called:

Options:

A.

Risk diffusion

B.

Risk production

C.

Risk spreading

D.

Risk protection

Question 44

What must be thought of as supportive of security operations rather than as the principal defense?

Options:

A.

Insurance

B.

Loss-prevention

C.

Premiums

D.

Bonds

Question 45

What might be the resentment of an employee who feels the vengefulness of an employee who has been passed over for promotion?

Options:

A.

desire

B.

motive

C.

opportunity

D.

all of the above

Question 46

What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?

Options:

A.

Strict liability

B.

Plaintiff

C.

Defendant

D.

None of the above

Question 47

The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:

Options:

A.

Analysis

B.

Integrity

C.

Security

D.

Availability

Question 48

What implies that the confinement is for personal advantage rather than to bring the plaintiff to court?

Options:

A.

Battery

B.

Confinement

C.

False imprisonment

D.

None of the above

Question 49

Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:

Options:

A.

Unrecognized holds

B.

Hold-on liabilities

C.

Hold harmless clauses

D.

None of the above

Question 50

In which ingredients are added to the loss prevention function one by one as the need arises, without a comprehensive plan, is called:

Options:

A.

Piecemeal security

B.

Small relative security

C.

Detached security

D.

Independent security

Question 51

Which of the following are the four types of lock-down systems?

Options:

A.

locks, plates, cables and alarms

B.

cages, plates, bolts and alarms

C.

cages, plates, cables and alarms

D.

cages, padlock, cables and alarms

Question 52

What scrambles the information so that it is not usable unless the changes are reversed?

Options:

A.

Distraction

B.

Disgruntling

C.

Falsification

D.

Encryption

Question 53

Which of the following is NOT the category of signaling systems?

Options:

A.

Global

B.

Auxiliary

C.

Remote station

D.

Central station

Question 54

A good hybrid security operation consists of which component?

Options:

A.

engaged corporate liaison

B.

consistent contract management support

C.

accurate quality measurements

D.

All of the above

Page: 1 / 12
Total 120 questions