Exam4Training

AACE PSP Planning & Scheduling Professional Online Training

Question #1

____________ includes self-employed individuals and funded business entities and organizations providing security-related services to specific clientele for a fee.

  • A . Public security
  • B . Private security
  • C . Security firm
  • D . Security function

Reveal Solution Hide Solution

Correct Answer: B
Question #2

Business continuity is a two-stage process, ____________ is the first stage, ____________ is the second.

  • A . business continuity, business recovery
  • B . business recovery, business resumption
  • C . business recovery, business continuity
  • D . business continuity, business resources

Reveal Solution Hide Solution

Correct Answer: B
Question #3

LANs and WANs can communicate with each other using a communications rule called:

  • A . Ethernet Protocol packet
  • B . Protocol Assembly packet
  • C . XOP.210 Protocol packet
  • D . Internet Protocol packet

Reveal Solution Hide Solution

Correct Answer: D
Question #4

_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.

  • A . Program Valuation
  • B . Risk analysis
  • C . Security survey
  • D . Performance audit

Reveal Solution Hide Solution

Correct Answer: C
Question #5

Which of the following is the most widely accepted classification of skills for the leadership?

  • A . Skill Mix
  • B . Conceptual
  • C . Human relations
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #6

Under the principle of agency law, such an assignment transfers the liability for the service from the corporation to the independent contractor with obligations that some cannot be entirely transferred, is called:

  • A . Non-delegable duty
  • B . Delegable duty
  • C . Non-Crime duty
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: A
Question #7

Which of the following is NOT the distinct action that fall into invasion of privacy?

  • A . misappropriation of the plaintiff’s name or picture for commercial advantage
  • B . placing the plaintiff in the false light
  • C . private disclosure of public facts
  • D . intrusion into the seclusion of another

Reveal Solution Hide Solution

Correct Answer: C
Question #8

The relationship between the two groups continues to be strained because of which key issue?

  • A . Perceived competition
  • B . Provision of services in borderline of responsibility
  • C . Moonlight policies for public police
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #9

A solicitation by police officers is another charge that may be leveled against security officers is called:

  • A . Criminal liability
  • B . Wrongful death
  • C . Verdict Act
  • D . Entrapment

Reveal Solution Hide Solution

Correct Answer: D
Question #10

When yard space and warehousing is required even in urban areas, __________ is the boundary of the property owned by the company.

  • A . Fence
  • B . Wall
  • C . Perimeter
  • D . Chain link

Reveal Solution Hide Solution

Correct Answer: C

Question #11

The concept that accepts the fact that the plaintiff may have contributed to his or her own injury, such as being in a restricted area or creating a disturbance or some hazard is known as:

  • A . Control tactics
  • B . Comparative fault
  • C . Defensive control
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: B
Question #12

In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #13

A device that sends a signal about whatever is sensed to some other location is called:

  • A . Signal device
  • B . Circuit device
  • C . Wave device
  • D . Line device

Reveal Solution Hide Solution

Correct Answer: B
Question #14

Information contained in buffers or random access memory is kept until the space is written over on the machine is turned off is known as:

  • A . Random memory
  • B . Scavenging memory
  • C . Awaiting memory
  • D . Search memory

Reveal Solution Hide Solution

Correct Answer: B
Question #15

The individual who commits a tort is called a tort-feasor, where as the injured party is called the plaintiff.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #16

The division of several area programmed supervision results in a aggregate operational audit, and aggregate operational audit considered in aggregate are an entire company’s programmed supervision.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: B
Question #17

What involves walking or riding a given route to observe the condition of the facility?

  • A . Patrol duty
  • B . Posts
  • C . Reserves
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: A
Question #18

What incorporate a detection system, which can eliminate concerns over water damage and false activation of the system?

  • A . Discovery system
  • B . Exposure
  • C . Post-action system
  • D . Pre-action system

Reveal Solution Hide Solution

Correct Answer: D
Question #19

Worms take over computer memory and deny its use to legitimate programs.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #20

Which of the following is NOT the activity and concern of a crisis management plan?

  • A . Crisis management team
  • B . Disaster operation
  • C . Media operation
  • D . Vital records

Reveal Solution Hide Solution

Correct Answer: D

Question #21

What allows people to log on to a remote computer and use the resources of that system if they have a valid account?

  • A . Cabinet
  • B . Telnet
  • C . Telecom
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: B
Question #22

To deal with the lack of security, both government organizations have developed guidelines for protecting electric facilities and distribution systems. On the private side, the Edison Electric Institute developed guidelines that have been passed on to the North American Electric Reliability Council (NERC), the U.S. Department of Energy’s coordinator for the electrical infrastructure. Among other things the guide lines cover:

  • A . Vulnerability/risk analysis
  • B . Threat response
  • C . Cyber scenario
  • D . Emergency detection

Reveal Solution Hide Solution

Correct Answer: A,B
Question #23

What implies that the confinement is for personal advantage rather than to bring the plaintiff to court?

  • A . Battery
  • B . Confinement
  • C . False imprisonment
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: C
Question #24

A hybrid system is a combination of:

  • A . Security & Control
  • B . Standard & Security acts
  • C . Security consultants & services
  • D . Proprietary & Contract security

Reveal Solution Hide Solution

Correct Answer: D
Question #25

A good risk management program involves:

  • A . Identify risks or specific vulnerabilities
  • B . Analyze and study risks, including likelihood and degree of danger of an event
  • C . Study of security programs
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #26

Coverage of what provides remuneration for losses due to employee dishonesty?

  • A . Fidelity Bonds
  • B . Surety Bonds
  • C . 3-D policies
  • D . Insurance against loss of use

Reveal Solution Hide Solution

Correct Answer: A
Question #27

The common practices in recruiting a jihadist are:

  • A . identifying individuals with appropriate ideology
  • B . indoctrination
  • C . training and preparation for the terrorist act
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #28

The amount of force may be equal to, but not greater than, the force is being used against them, this phenomenon is called:

  • A . Security
  • B . Protection
  • C . Self-defense
  • D . Precautions

Reveal Solution Hide Solution

Correct Answer: C
Question #29

What is a feeling of responsibility and respect that develops during an individual’s formative years and is subconscious?

  • A . Moral honesty
  • B . Trustworthiness
  • C . Integrity
  • D . Candor

Reveal Solution Hide Solution

Correct Answer: A
Question #30

Contingency planning is the result of which four major components?

  • A . emergency response, crisis management, pressure devices, risk analysis
  • B . emergency response, crisis management, business recovery, business resumption
  • C . basic planning, crisis management, business recovery, business resumption
  • D . under investigation, crisis management, business recovery, pressure devices

Reveal Solution Hide Solution

Correct Answer: B

Question #31

What are wide-beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier?

  • A . Floodlights
  • B . Search lights
  • C . Perimeter lighting
  • D . Fresnel Lenses

Reveal Solution Hide Solution

Correct Answer: D
Question #32

The bus transportation system, represented by the American Bus Association has established an American Action Plan designed to improve safety and safety for bus operations.

The goals of this plan are all of the following EXCEPT:

  • A . To promote security vigilance among operators through training and partnership with law enforcement agencies
  • B . To assist companies in developing infrastructures
  • C . To preserve the bus industry as a strategic transportation reserve
  • D . To protect the transportation infrastructure

Reveal Solution Hide Solution

Correct Answer: B
Question #33

Which of the following is the category of integrity and lie detection tests?

  • A . Polygraph
  • B . Psychological Stress Evaluator
  • C . Personal Security Inventory
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #34

Communism has common property and radical Islam has sharing property

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #35

Pandemics affect people, not infrastructure.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #36

In ___________, air has been reduced or fuel is dwindling to the point where there is no visible flame, just an entire area filled with tremendous heat.

  • A . Smoldering burning
  • B . Ignition stage
  • C . Last stage
  • D . Incipient stage

Reveal Solution Hide Solution

Correct Answer: A
Question #37

Which of the following is NOT the type of viruses?

  • A . Innocuous Virus
  • B . Humorous Virus
  • C . Hostile Virus
  • D . Altering Virus

Reveal Solution Hide Solution

Correct Answer: C
Question #38

The process of planning for response, recovery, and resumption activities for the infrastructure, critical processes and other elements is known as:

  • A . Contingent planning
  • B . Continuity planning
  • C . Resource planning
  • D . Resumption planning

Reveal Solution Hide Solution

Correct Answer: A
Question #39

The purpose of methodical examination is to:

  • A . Find deviations from established security standards and practices
  • B . Find loopholes in security controls
  • C . consider means of improving the efficiency or control of the operation without reducing security
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #40

What is an operational method in which the very act of the attack is dependent upon the death of the perpetrator?

  • A . Time bomb attack
  • B . Terrorist attack
  • C . Suicide attack

Reveal Solution Hide Solution

Correct Answer: C

Question #41

What considers all aspects of the security operation on a continuing basis?

  • A . Security Vulnerability
  • B . Data-security Act
  • C . Inspection criterion
  • D . Operational Audit

Reveal Solution Hide Solution

Correct Answer: D
Question #42

A good hybrid security operation consists of which component?

  • A . engaged corporate liaison
  • B . consistent contract management support
  • C . accurate quality measurements
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #43

Reserves are the people standing by in the event that assistance is needed by security personnel on fixed posts or patrol; duty.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #44

Which of the following is NOT the advantage of proprietary officers?

  • A . Quality of personnel
  • B . Loyalty
  • C . Impartiality
  • D . Prestige

Reveal Solution Hide Solution

Correct Answer: C
Question #45

A legal research generally involves locating:

  • A . the applicable statute
  • B . the applicable case law
  • C . related articles in professional journals
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #46

What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?

  • A . Strict liability
  • B . Plaintiff
  • C . Defendant
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: A
Question #47

A voluntary and intentional violation by a legally competent parson of a legal duty that commands or prohibits an act for the protection of society is known as:

  • A . Corruption
  • B . Law-breaking
  • C . Fault
  • D . Crime

Reveal Solution Hide Solution

Correct Answer: D
Question #48

____________ builds on confusion when two or more people take advantage of their positions and the confusion to steal.

  • A . Conspiracy
  • B . Accountability
  • C . Invoicing
  • D . Proliferation

Reveal Solution Hide Solution

Correct Answer: A
Question #49

Critical process recovery requires an assessment of resources.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #50

Who developed Ethernet?

  • A . Xeror Corporation
  • B . IBM
  • C . Microsoft
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: A

Question #51

_______ requires that the arrestee be turned over to the authorities as soon as practicable and in any event without unreasonable delay.

  • A . Arrest
  • B . Detain
  • C . Detention
  • D . Threatening loss

Reveal Solution Hide Solution

Correct Answer: A
Question #52

Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.

  • A . True
  • B . False

Reveal Solution Hide Solution

Correct Answer: A
Question #53

From a management point of view, organizing the security effort involves:

  • A . Planning & goal setting
  • B . Establishing controls
  • C . Hiring personnel
  • D . All of the above

Reveal Solution Hide Solution

Correct Answer: D
Question #54

Employers must have a program to communicate more details on all hazards, including a ________________________ that must be available for each chemical at the work site.

  • A . Asset standard Act
  • B . Material Safety Data Sheet
  • C . Procurement Asset Safety Program
  • D . Product stability program

Reveal Solution Hide Solution

Correct Answer: B
Question #55

Which of the following is NOT the category of contingency planning program?

  • A . those that impact the business infrastructure
  • B . those that impact the people
  • C . those that impact the processes
  • D . those that impact the reputation of the business

Reveal Solution Hide Solution

Correct Answer: C
Question #56

What refers to the number of employees over which any individual can exercise direct supervision effectively?

  • A . Corporate period
  • B . Delegate control
  • C . Span of control
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: C
Question #57

The classic triangle frequently referred to in describing the nature of fire consists of:

  • A . heat, fuel, oxygen
  • B . heat, light, oxygen
  • C . heat, smoke, oxygen
  • D . heat, carbon dioxide, oxygen

Reveal Solution Hide Solution

Correct Answer: A
Question #58

Which alarm warn of a process reaching a dangerous temperature, of the presence of toxic fumes, or that a machine is running too fast?

  • A . Burglar alarm
  • B . Special-use alarm
  • C . Intrusion alarms
  • D . Protection alarm

Reveal Solution Hide Solution

Correct Answer: C
Question #59

What focus on legal principles and theories along with cases in which such principles predominate?

  • A . Encyclopedias
  • B . Legal document
  • C . Formal memorandum
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: A
Question #60

Based on non-delegable duty, contractual provisions that shift liability to the subcontractors have not been recognized by the courts and are called:

  • A . Unrecognized holds
  • B . Hold-on liabilities
  • C . Hold harmless clauses
  • D . None of the above

Reveal Solution Hide Solution

Correct Answer: C
Exit mobile version