New Year Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ASIS-CPP Certified Protection Professional (CPP) Exam Questions and Answers

Questions 4

An investigative agency has been storing samples of hazardous materials which were collected as evidence in a recently adjudicated case and are no longer needed. To dispose of the hazardous materials, the agency should:

Options:

A.

place the hazardous materials in an air-tight, waterproof container and place them in the regular waste bin.

B.

obtain disposition assistance from a qualified contractor who understands local regulations about hazardous waste.

C.

call the local fire department non-emergency number and request that the Tire department take possession of the hazardous materials.

D.

place the hazardous materials in a metal container and ask an employee to transport them to a local waste disposal facility.

Buy Now
Questions 5

While conducting an executive protection risk assessment, the executive protection specialist should focus on what two areas in order to rate the risks?

Options:

A.

Threat transfer and threat spreading

B.

Threat avoidance and threat mitigation

C.

Threat analysis and threat likelihood

D.

Threat control and threat hazards

Buy Now
Questions 6

Alarm sensors that utilize the Doppler effect are:

Options:

A.

infrared.

B.

photoelectric.

C.

capacitance.

D.

microwave.

Buy Now
Questions 7

Applicant falsifications generally fall into two categories, misrepresentation and:

Options:

A.

embellishment of positions held.

B.

conflicting dales of employment

C.

inadequate reference identification.

D.

willful omissions of material facts.

Buy Now
Questions 8

When managing an investigative unit, the best way to obtain favorable support for budget requests is to:

Options:

A.

cut education and training expenses for the unit

B.

provide estimates of overall investigative costs.

C.

utilize investigators in roles outside of the unit.

D.

demonstrate restitution and recovery benefits.

Buy Now
Questions 9

Crime Prevention Through Environmental Design is a set of management tools targeting:

Options:

A.

vault, safe, and intrusion testing.

B.

access control. CCTV and burglar and fire alarm systems.

C.

fencing, lighting, bollards, and gates.

D.

places, behavior, and the design and use of space.

Buy Now
Questions 10

The greatest protection of assets is provided when a security system consists of an appropriate mix of:

Options:

A.

physical, procedural, and electronic security measures.

B.

planning, communications, and management involvement.

C.

personnel training, risk management, and management involvement.

D.

hiring practices, physical barriers, and awareness training.

Buy Now
Questions 11

Which of the following types of intrusion detection systems is commonly used to protect safes and file cabinets?

Options:

A.

Pin core

B.

Pick resistant

C.

Capacitance

D.

Electro-mechanical

Buy Now
Questions 12

Which type of alarm sensor detects heat from a human body?

Options:

A.

Microwave

B.

Passive infrared

C.

Temperature

D.

Ultrasonic

Buy Now
Questions 13

Which type of sensor creates an electrical field around metallic objects that signals an alarm when activated?

Options:

A.

Ultrasonic motion

B.

Grid wire electrolytic

C.

Capacitance

D.

Balance magnetic

Buy Now
Questions 14

Senior management establishes guidelines for acceptable expenditures and then allocates a specific amount of money to a security department. This type of budget process is called:

Options:

A.

zero based

B.

bottom line

C.

lop down.

D.

bottom up.

Buy Now
Questions 15

In addition to utilizing state-of-the-art locking devices, electronic surveillance, and spaces designed to maximize effective use by intended users, what other CPTED strategies can be used to enhance a security system?

Options:

A.

A focus on policies and activities that encourage observation, reporting, and intervention

B.

The implementation of access control and identification badge programs.

C.

The construction of a perimeter fencing and barriers that deters potential intrusion.

D.

The implementation of vehicular bollards at the dock entrance.

Buy Now
Questions 16

To be considered a trade secret, information must meet all of the following criteria EXCEPT:

Options:

A.

the owner must take steps to prevent its unauthorized disclosure.

B.

persons to whom it is disclosed must know that it is secret.

C.

it must not be identifiable-

D.

it must not be available already in the public domain.

Buy Now
Questions 17

Evolving trends within the security profession fall into the areas of:

Options:

A.

surveillance and protection.

B.

risk identification and risk control.

C.

security technology, organization, and human resources.

D.

personnel, training, and communications.

Buy Now
Questions 18

The starting point for pre-employment screening is the:

Options:

A.

list of references.

B.

application.

C.

interview.

D.

resume.

Buy Now
Questions 19

An indication of deception by a suspect during the interviewing process would be:

Options:

A.

giving direct, spontaneous responses to questions.

B.

asking clarifying questions

C.

casually changing position.

D.

engaging in a variety of tension-relieving gestures.

Buy Now
Questions 20

There is ample evidence that private policing can deliver more efficient services at a lower cost. Savings are typically based on which of the following?

Options:

A.

Less precise allocation of responsibility

B.

More incentives and penalties for the provider

C.

More constraint on processes and less focus on results

D.

Less flexible use of labor

Buy Now
Questions 21

Passive infrared sensors detect intruders by sensing:

Options:

A.

the contrast between the Thermal energy of an intruder's body and the energy of the surrounding area.

B.

an intruder passing through a pulsed light beam emitted by the detector.

C.

the air shift that occurs when an intruder passes through the sensor's field.

D.

the contrast between an intruder's clothing and the stationary objects the intruder passes in front of.

Buy Now
Questions 22

An effective as set-protection scheme comprising a series of well-planned and complementary levels of security is called:

Options:

A.

defense in depth.

B.

strategic risk management

C.

risk management.

D.

paradigm shift frequency protection

Buy Now
Questions 23

Assessing the potential consequences of a disruption within a functions area is known as:

Options:

A.

business continuity planning.

B.

business impact analysis.

C.

security survey.

D.

consequence analysis.

Buy Now
Questions 24

Which of the following types of lighting enables a color video surveillance camera to produce the most accurate color rendition?

Options:

A.

High-pressure sodium

B.

Mercury vapor

C.

Low-pressure sodium

D.

Metal halide

Buy Now
Questions 25

All policies and procedures for drug testing should be:

Options:

A.

require mandatory testing of all managers.

B.

applied on an "as needed" basis.

C.

separate from any collective bargaining agreement.

D.

administered consistently.

Buy Now
Questions 26

The goal of emergency planning is to provide for the protection of life and property, the containment of loss, and the:

Options:

A.

collaboration with media personnel.

B.

creation of an understanding between management and employees.

C.

prompt restoration of normal operations.

D.

clear training of emergency personnel.

Buy Now
Questions 27

An important element of an emergency response plan includes:

Options:

A.

recovery operation procedures.

B.

utilizing an incident management system.

C.

designating a hot site.

D.

shift relief procedure for response personnel.

Buy Now
Questions 28

Whenever possible, security planning for a new facility should begin during which of the following phases?

Options:

A.

Floor plan design

B.

Zoning approval

C.

Site selection

D.

Construction

Buy Now
Questions 29

Which of the following surveys should be conducted to determine the effectiveness of risk controls and justify their placement within the security budget?

Options:

A.

Probability analysis

B.

Cost-benefit analysis

C.

Cyber risk assessment

D.

Vulnerability assessment

Buy Now
Questions 30

When companies are downsizing their staffs. increasing a manager's span of control is often effective because it:

Options:

A.

cuts overhead and increases flexibility.

B.

encourages tight supervision and reduces cost.

C.

reduces cost and discourages employee autonomy, which isolates upper management.

D.

discourages employee autonomy and cuts overhead.

Buy Now
Questions 31

If an employer does not utilize testing for drug impairment it should:

Options:

A.

discourage drug use during working hours.

B.

enact a policy prohibiting detectable illegal drugs.

C.

report suspected impairment to law enforcement.

D.

offer counseling through employee assistance programs

Buy Now
Questions 32

Alcohol-abuse symptoms are similar to symptoms associated with the abuse of:

Options:

A.

depressants.

B.

stimulants.

C.

hallucinogens.

D.

narcotics.

Buy Now
Questions 33

A cost-benefit analysis is essential to:

Options:

A.

balance the security budget.

B.

select the proper risk treatment.

C.

predict long-Term financial concerns.

D.

select the most affordable security solution.

Buy Now
Questions 34

In the management of an incident, which group has the capability to make informed decisions using available information?

Options:

A.

Bomb evaluation and assessment response (BEAR) team

B.

Bomb assessment team (BAT)

C.

Bomb threat response team (BTRT)

D.

Threat evaluation team (TET)

Buy Now
Questions 35

Responsibility for shutdown supervision should be assigned by the disaster plan to a facility's engineering service The actual shutdown should be accomplished by:

Options:

A.

a maintenance worker.

B.

senior management.

C.

the plant manager

D.

employees familiar with the process.

Buy Now
Questions 36

Which of the following locks generally has the greatest delay factor?

Options:

A.

Pin tumbler

B.

Warded

C.

Lever

D.

Disc tumbler

Buy Now
Questions 37

A fidelity bond is a type of insurance that will compensate for company losses from:

Options:

A.

employee negligence.

B.

data toss.

C.

employee dishonesty.

D.

natural disasters.

Buy Now
Questions 38

Which of the following is a major problem associated with drug use in the workplace?

Options:

A.

Attendance

B.

Increased arrest rate

C.

Policy control

D.

Drug distribution

Buy Now
Questions 39

For large commercial and industrial enterprises, the need to resume normal operations as quickly as possible after a disaster is:

Options:

A.

as great as the need to control damage

B.

more important than the need to control damage.

C.

only a secondary concern during recovery.

D.

less important than the need to control damage

Buy Now
Questions 40

Which method of wiretapping does not require a physical connection to a line?

Options:

A.

Inductive coupling

B.

Connective functioning

C.

Active imaging

D.

Hardwire connection

Buy Now
Questions 41

A major advantage of outsourcing investigative services is the ability to:

Options:

A.

expand or reduce the workforce according to actual needs

B.

maintain closer liaison relations with local agencies and internal contacts

C.

increase the control of investigation quality.

D.

easily manage the contractor.

Buy Now
Questions 42

An erroneous test result that indicates the presence of a drug that is absent is known as a:

Options:

A.

presumed positive

B.

false positive.

C.

false negative.

D.

presumed impairment.

Buy Now
Questions 43

Which of the following locks generally has the greatest delay factor?

Options:

A.

Pin tumbler

B.

Warded

C.

Lever

D.

Disc tumbler

Buy Now
Questions 44

The most important function of executive protection is:

Options:

A.

liaison with police agencies.

B.

hiring qualified personnel.

C.

familiarization with local laws.

D.

planning and advance work.

Buy Now
Questions 45

The two key elements in any contingency plan are:

Options:

A.

a threat procedure and a safety procedure.

B.

a procedure for reporting and a procedure for training.

C.

what is to be done and who is to do it.

D.

local assistance and response.

Buy Now
Questions 46

Opium, morphine, and codeine are all classified as:

Options:

A.

depressants.

B.

narcotics.

C.

stimulants.

D.

hallucinogens.

Buy Now
Questions 47

Capacitance alarm systems are sometimes referred to as:

Options:

A.

sonic alarms.

B.

proximity alarms.

C.

vibration detector alarms.

D.

ultrasonic alarms

Buy Now
Questions 48

In terms of information systems security (ISS), "residual risk" is:

Options:

A.

the total remaining potential risk after all ISS countermeasures are applied across all threats.

B.

the remaining potential risk for each threat after all ISS countermeasures are applied.

C.

the product of the level of threat and the level of vulnerability

D.

equal to threats multiplied by countermeasures and divided by vulnerabilities.

Buy Now
Questions 49

Who shall establish, document, provide resources, and demonstrate commitment to a business continuity management policy within the defined scope of the business continuity management system?

Options:

A.

Top management

B.

Security manager

C.

Human resource manager

D.

Chief financial officer

Buy Now
Questions 50

A software program that performs a useful purpose but also has a hidden destructive purpose is known as a:

Options:

A.

logic bomb.

B.

virus

C.

Trojan horse.

D.

worm.

Buy Now
Questions 51

The two basic bomb classifications are:

Options:

A.

ignition and detonation.

B.

fragmentation and fire.

C.

heat and blast.

D.

explosive and incendiary.

Buy Now
Questions 52

After an information loss, which of the following three steps should be taken by an organization?

Options:

A.

Identify source of the leak, implement the business continuity plan, update security procedures

B.

Contact law enforcement, preserve all evidence, ensure the investigation is not compromised

C.

Conduct an investigation, conduct a damage assessment, implement the recovery plan

D.

Suspend access to the perpetrator, conduct an inventory of proprietary information, document the investigation

Buy Now
Questions 53

In a theft of proprietary information case, which of the following steps is most important to the security manager?

Options:

A.

Sensitive products wore not displayed at trade shows.

B.

Active steps were taken to protect the information.

C.

Every employee was trained to classify the information.

D.

The information was patented, trademarked, or copyrighted

Buy Now
Questions 54

The primary emergency response for employees inside a building during an earthquake includes:

Options:

A.

shelter, evaluate, and recover.

B.

duck, cover, and hold

C.

vacate, evaluate, and return.

D.

move, cover, and evacuate.

Buy Now
Questions 55

Post orders should be developed with which of the following criteria in mind?

Options:

A.

Each order is indexed

B.

Each order is detailed

C.

Each order is written in third party language

D.

Each order deals with one subject

Buy Now
Questions 56

Which of the following statements about a new alarm system is true?

Options:

A.

It should be purchased only when replacing existing security forces.

B.

It should be purchased only after an effective cost analysis.

C.

It will reduce the cost of the current security program.

D.

It will reduce the cost of managing the security program.

Buy Now
Questions 57

Which of the following provides the basis in a contract to evaluate return on investment?

Options:

A.

Itemized cost breakdown

B.

Significant penalty clauses

C.

Key performance indicators

D.

Detailed and specified requirements

Buy Now
Questions 58

According to the Substance Abuse and Mental Health Services Administration study of 2000. the vast majority of illicit drug users are:

Options:

A.

unemployed

B.

incarcerated

C.

employed.

D.

on parole

Buy Now
Questions 59

The key difference between an interview and an interrogation is in the:

Options:

A.

number of questions asked.

B.

person being questioned.

C.

seriousness of the matter under investigation.

D.

person asking the questions.

Buy Now
Questions 60

For a company that operates at a net profit of 5%. the amount of additional sales required to offset the loss of $50 is:

Options:

A.

$25.00

B.

$250.00

C.

$1,000.00

D.

$10,000.00

Buy Now
Questions 61

To conduct the job analysis, it is necessary to define the positions within the security department and identify the:

Options:

A.

compensation and benefits for each position.

B.

minimum required staffing levels.

C.

behaviors necessary to perform those jobs.

D.

number of positions by category.

Buy Now
Questions 62

The organization's assets and potential hazards against which the security function seeks to provide protection are commonly classified as:

Options:

A.

violent and nonviolent acts

B.

accident and safety,

C.

natural and man-made.

D.

theft and fraud.

Buy Now
Questions 63

The major advantage of zero-based budgeting is that:

Options:

A.

it forces managers to consider alternative ways to get the job done.

B.

it automatically funds the programs already in place.

C.

the manager has to justify only new budget items.

D.

programs operating at a loss are automatically eliminated.

Buy Now
Questions 64

Choosing a security container for a specific software application is largely determined by value and what other characteristic of the item to be stored?

Options:

A.

Vulnerability

B.

Commonality

C.

Place of origin

D.

Reproducibility

Buy Now
Questions 65

Which of the following statements best describes the difference between covert and overt surveillance?

Options:

A.

Overt surveillance may be used by public and private sector personnel, whereas covert surveillance may only be done by public law enforcement personnel.

B.

Covert surveillances are normally detection-oriented, whereas overt surveillances are usually prevention-oriented.

C.

Covert surveillances are used when there is knowledge of a criminal act, whereas overt surveillance is used when a criminal act is suspected.

D.

Notice of overt surveillance must always be given, whereas covert surveillance may be conducted without the suspect or target's knowledge.

Buy Now
Questions 66

A risk manager may choose to use an insurance broker because a broker:

Options:

A.

has more knowledge about insurance than the risk manager.

B.

represents a mutual insurance group.

C.

represents more than one company and can suggest the best insurance option.

D.

will best represent the insurance company's interests regarding policy coverages and limits.

Buy Now
Questions 67

Which of the following types of ethics is the most relevant to business?

Options:

A.

Applied

B.

Descriptive

C.

Analytical

D.

Practical

Buy Now
Exam Code: ASIS-CPP
Exam Name: Certified Protection Professional (CPP) Exam
Last Update: Jan 11, 2025
Questions: 230

PDF + Testing Engine

$57.75  $164.99

Testing Engine

$43.75  $124.99
buy now ASIS-CPP testing engine

PDF (Q&A)

$36.75  $104.99
buy now ASIS-CPP pdf