Planning & Scheduling Professional (PSP) Exam Questions and Answers
In which approach of comparative negligence, the plaintiff may collect something for injuries even if he or she was primarily responsible for the injuries?
Detention differs from arrest in that it permits a merchant to detain a suspected shoplifter briefly without turning the suspect over to the police.
_______________ of risk involves planning for an eventual loss without benefit of insurance.
A set of unwanted instructions executed on a computer and resulting in a variety of effects is called:
Tapping without authorization into communication lines over which digitized computer data and messages are being sent is called:
A complete contingency planning program has which of the following major elements?
The moment the fire begins, when fuel, air, and an ignition source all come together at the right rate for the correct period of time id called:
Contingency planning is the result of which four major components?
A primary ingredient that represents the loss prevention specialist’s opportunity to reduce theft is called:
The computers those are capable of great processing speed and data storage, allowing multiple users to utilize the system simultaneously is called:
A system of discussion groups in which individual articles are distributed throughout the world is called:
Businesses have been forced to come to terms with potential consequences of taking security risks and the solution which should be complementary is:
Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.
Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.
Removing the problem by eliminating the risk is known as:
Those who are delegated authority in the direct chain of command to accomplish specific organizational objectives are known as:
Which of eth following is NOT the type of insurance?
Which liability is of concern to enterprises that contract or employs security services and is an indirect legal responsibility?
Which of the following is the most widely accepted classification of skills for the leadership?
A civil action based on the principle that one individual can expect certain behavior from another individual is known as:
In ___________, air has been reduced or fuel is dwindling to the point where there is no visible flame, just an entire area filled with tremendous heat.
Private sector will become increasingly involve in crime prevention; public law enforcement will then be free to concentrate more heavily on violent crimes and crime response.
Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:
____________ includes self-employed individuals and funded business entities and organizations providing security-related services to specific clientele for a fee.
What is a major management function in business worldwide?
Which of the following is NOT the organizational level of international terrorism?
The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?
Which records provide detailed, documented records of an applicant’s personal history, background, and financial relationships?
What are restricted as to entrance or movement by all but authorized personnel and vehicles?
What results from fearing the consequences of being caught; and is a product of reasoning?
What can be used as servers and do not require special installation?
What must be accomplished to accurately determine the financial and operational impact that could result from an interruption of enterprise operations?
A system in which a badge or pass coded for authorization to enter specific areas is issued to an employee, who keeps it until the authorization id changed or until he or she leaves the company is called:
Who developed Ethernet?
The division of several area programmed supervision results in a aggregate operational audit, and aggregate operational audit considered in aggregate are an entire company’s programmed supervision.
The number of security personnel required is generally inversely proportional to the size of the facility, expressed both in terms of square footage or acreage and the number of employees involved.
Theft triangle consists of:
___________ is a controllable variable and how much control is necessary depends on the degree of honesty of each individual.
What are used only for handling and storing high-value cargo?
Which of the following is the category of integrity and lie detection tests?
A system that is independently owned and operated by an alarm company is known as:
An examination of persons and/or their property for the purpose of discovering evidence of guilt in relation to some specific offense is known as:
Decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss is called:
What must be thought of as supportive of security operations rather than as the principal defense?
What might be the resentment of an employee who feels the vengefulness of an employee who has been passed over for promotion?
What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?
The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:
What implies that the confinement is for personal advantage rather than to bring the plaintiff to court?
Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:
In which ingredients are added to the loss prevention function one by one as the need arises, without a comprehensive plan, is called:
Which of the following are the four types of lock-down systems?
What scrambles the information so that it is not usable unless the changes are reversed?
Which of the following is NOT the category of signaling systems?
A good hybrid security operation consists of which component?