ASIS ASIS-CPP Übungsprüfungen
Zuletzt aktualisiert am 06.05.2025- Prüfungscode: ASIS-CPP
- Prüfungsname: Certified Protection Professional
- Zertifizierungsanbieter: ASIS
- Zuletzt aktualisiert am: 06.05.2025
In large-scale emergencies, the Incident Command System can be effectively deployed by:
- A . private sector organizations only.
- B . federal agencies only.
- C . public and private sector organizations.
- D . public sector organizations only.
A security professional is designing a CCTV system to monitor activity in an employee parking lot that is 2,200 feet from the monitoring station.
Which type of cable will best transmit the signal?
- A . Coaxial
- B . Fiber optic
- C . Twisted pair
- D . Network
The human behavior theory that a person is actuated by values, beginning with the most basic need for survival, is:
- A . Maslow’s Hierarchy of Needs.
- B . Corey’s "First Things First."
- C . McGregor’s Theory X and Theory Y.
- D . Herzberg’s Motivation Theory.
Employees well-instructed on security awareness are better equipped to:
- A . protect assets, understand the relationship between security and operations, communicate effectively with law enforcement, and reduce organizational liability.
- B . protect assets, understand the relationship between security and operations, know personal secunty responsibilities, comply with regulatory requirements and contractual obligations, and reduce organizational liability.
- C . perform security risk and vulnerability assessments, prepare for and respond to potential emergencies, and reduce organizational liability.
- D . prepare for and respond to potential emergencies, protect assets, communicate effectively with law enforcement, investigate internal allegations, and reduce organizational liability.
A security consultant has been retained to assist management at a warehouse with a cargo theft problem they have been experiencing.
One of the first areas the consultant should explore is to:
- A . check with the local Police Department to determine if an organized retail crime ring is operating in the area.
- B . determine whether documentation and shipping procedures may pose a security hazard.
- C . ensure container seals in use are replaced with high-security seals.
- D . employ GPS (Global Positioning System) tracking devices to determine the destination of stolen goods.
Training in which of the following subjects educates employees about ways to reduce exposure to body fluids and other potentially infectious materials?
- A . Disease control
- B . Bloodbome pathogens
- C . Infection containment
- D . Advanced life safety
The relationship between law enforcement and private security is best when it is:
- A . reciprocal.
- B . cooperative.
- C . interchangeable.
- D . parallel.
The first method to consider in designing a crime risk management system is risk:
- A . transfer.
- B . avoidance.
- C . reduction.
- D . acceptance.
A major objective of a business impact analysis is to:
- A . quantify the value of the security program and the proper staffing levels.
- B . identify which processes and computer applications are critical to the survival of the organization.
- C . justify the expenditure for an integrated system and identify the best vendor.
- D . place a value on all assets and calculate the total loss potential.
To motivate employees, supervisors should:
- A . get to know the employees.
- B . hold on to good employees.
- C . display operational prowess.
- D . maintain high personal standards.