ASIS ASIS-CPP Übungsprüfungen
Zuletzt aktualisiert am 03.09.2025- Prüfungscode: ASIS-CPP
- Prüfungsname: Certified Protection Professional
- Zertifizierungsanbieter: ASIS
- Zuletzt aktualisiert am: 03.09.2025
Which of the following types of lighting enables a color video surveillance camera to produce the most accurate color rendition?
- A . High-pressure sodium
- B . Mercury vapor
- C . Low-pressure sodium
- D . Metal halide
The true art of delegation includes:
- A . giving responsibility with commensurate authority and holding the employee fully accountable for use of that authority.
- B . giving responsibility with commensurate authority and holding the employee’s supervisor fully
accountable for use of that authority. - C . giving accountability with flexibility and then retaining responsibility for ensuring that the authority is used.
- D . giving accountability with authority and holding the employee responsible for use of that authority.
Which security program emphasizes a continuing attitude that can move an individual to take specific actions to report or decrease security risks?
- A . Training
- B . Sustainment
- C . Education
- D . Awareness
The three types of line transmissions in electronic protection systems are:
- A . loop, Doppler. and multiplex.
- B . point-to-point. Doppler, and multiplex.
- C . Doppler, point-to-point, and loop.
- D . loop, point-to-point, and multiplex.
Tax laws, trade agreements, and product safety labeling are examples of what business macro-environment sector?
- A . Economic
- B . Demographic
- C . Political-legal
- D . Socio-cultural
According to the Substance Abuse and Mental Health Services Administration study of 2000. the vast majority of illicit drug users are:
- A . unemployed
- B . incarcerated
- C . employed.
- D . on parole
While conducting an executive protection risk assessment, the executive protection specialist should focus on what two areas in order to rate the risks?
- A . Threat transfer and threat spreading
- B . Threat avoidance and threat mitigation
- C . Threat analysis and threat likelihood
- D . Threat control and threat hazards
Which of the following surveys should be conducted to determine the effectiveness of risk controls and justify their placement within the security budget?
- A . Probability analysis
- B . Cost-benefit analysis
- C . Cyber risk assessment
- D . Vulnerability assessment
Having received a bomb threat from a non-credible source, the security manager should immediately:
- A . fully evacuate and then search.
- B . search without evacuating.
- C . partially evacuate and then search.
- D . fully evacuate without searching.
Which of the following pairs of attacks are described as the theft of login credentials through deception or manipulation in order to install remote access and monitoring software on to a device?
- A . Social engineering and malware
- B . Social engineering and direct hacking
- C . Direct hacking and malware
- D . Malware and web attack