Black Friday Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

PSP Planning & Scheduling Professional (PSP) Exam Questions and Answers

Questions 4

In communism, class struggle results in overthrowing capitalism and in radical Islam, faith struggle results in overthrowing of Russian capitalist society.

Options:

A.

True

B.

False

Buy Now
Questions 5

The degree to which a manager or supervisor is able to delegate responsibility rather than trying to do everything personally is a good measure of managerial ability.

Options:

A.

True

B.

False

Buy Now
Questions 6

The demographics of an ongoing police and security force at the ___________________ create opportunities for advancement.

Options:

A.

Company Level

B.

Personal level

C.

Management level

D.

Advance level

Buy Now
Questions 7

Contingency planning is the result of which four major components?

Options:

A.

emergency response, crisis management, pressure devices, risk analysis

B.

emergency response, crisis management, business recovery, business resumption

C.

basic planning, crisis management, business recovery, business resumption

D.

under investigation, crisis management, business recovery, pressure devices

Buy Now
Questions 8

Some people emerge as experts who then sell their expertise for a fee; these people are commonly referred to as:

Options:

A.

Respondents

B.

Consultants

C.

Directors

D.

Professionals

Buy Now
Questions 9

The bus transportation system, represented by the American Bus Association has established an American Action Plan designed to improve safety and safety for bus operations. The goals of this plan are all of the following EXCEPT:

Options:

A.

To promote security vigilance among operators through training and partnership with law enforcement agencies

B.

To assist companies in developing infrastructures

C.

To preserve the bus industry as a strategic transportation reserve

D.

To protect the transportation infrastructure

Buy Now
Questions 10

A controlled area where an even greater degree of security is required is called:

Options:

A.

Limited area

B.

Pass system area

C.

Multiple areas

D.

External area

Buy Now
Questions 11

The operations that are ‘in-house’, or controlled entirely by the company establishing security for its operations is called:

Options:

A.

Contract security operations

B.

Proprietary security operations

C.

Staffing operations

D.

Control operations

Buy Now
Questions 12

A device that sends a signal about whatever is sensed to some other location is called:

Options:

A.

Signal device

B.

Circuit device

C.

Wave device

D.

Line device

Buy Now
Questions 13

Tapping without authorization into communication lines over which digitized computer data and messages are being sent is called:

Options:

A.

Electronic eavesdropping

B.

War driving

C.

Digital beating

D.

Standard digitizing

Buy Now
Questions 14

The common practices in recruiting a jihadist are:

Options:

A.

identifying individuals with appropriate ideology

B.

indoctrination

C.

training and preparation for the terrorist act

D.

All of the above

Buy Now
Questions 15

The computers those are capable of great processing speed and data storage, allowing multiple users to utilize the system simultaneously is called:

Options:

A.

Workstations

B.

Main computers

C.

Supercomputers

D.

Mainframes

Buy Now
Questions 16

A hybrid system is a combination of:

Options:

A.

Security & Control

B.

Standard & Security acts

C.

Security consultants & services

D.

Proprietary & Contract security

Buy Now
Questions 17

Private security functions are not essentially client orientated; public law enforcement functions are society or community oriented.

Options:

A.

True

B.

False

Buy Now
Questions 18

Insurance can be a substitute for a security program.

Options:

A.

True

B.

False

Buy Now
Questions 19

Pandemics affect people, not infrastructure.

Options:

A.

True

B.

False

Buy Now
Questions 20

The relationship between the two groups continues to be strained because of which key issue?

Options:

A.

Perceived competition

B.

Provision of services in borderline of responsibility

C.

Moonlight policies for public police

D.

All of the above

Buy Now
Questions 21

The sites that are partially configured but are missing the central computer are called:

Options:

A.

Hot sites

B.

Warm sites

C.

Cold sites

D.

Frequent sites

Buy Now
Questions 22

What implies that the confinement is for personal advantage rather than to bring the plaintiff to court?

Options:

A.

Battery

B.

Confinement

C.

False imprisonment

D.

None of the above

Buy Now
Questions 23

Theft triangle consists of:

Options:

A.

dander, desire, opportunity

B.

motive, condition, opportunity

C.

motive, desire, opportunity

D.

dishonesty, financial problem, prospect

Buy Now
Questions 24

What is a means of making sure that a supervisor or other employees go through a prescribed series of inspections that will ascertain that functions or procedures for which they are responsible are being properly executed?

Options:

A.

Internal Audit

B.

Programmed Supervision

C.

Supervisory Inspection

D.

Security survey

Buy Now
Questions 25

_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.

Options:

A.

Physical security

B.

Network Security Policy

C.

Forensic investigations

D.

Spam filtering

Buy Now
Questions 26

A civil action based on the principle that one individual can expect certain behavior from another individual is known as:

Options:

A.

Transitivity

B.

Tort

C.

Reassembly

D.

Procurement

Buy Now
Questions 27

The moment the fire begins, when fuel, air, and an ignition source all come together at the right rate for the correct period of time id called:

Options:

A.

Free burning

B.

Ignition stage

C.

Pyrolysis stage

D.

Incipient stage

Buy Now
Questions 28

When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:

Options:

A.

Innocuous Bug

B.

Catastrophic Virus

C.

Hostile worm

D.

Trojan Horse

Buy Now
Questions 29

____________ includes self-employed individuals and funded business entities and organizations providing security-related services to specific clientele for a fee.

Options:

A.

Public security

B.

Private security

C.

Security firm

D.

Security function

Buy Now
Questions 30

Decentralizing a procedure or operation so that a security or safety problem at one location will not cause a complete loss is called:

Options:

A.

Risk diffusion

B.

Risk production

C.

Risk spreading

D.

Risk protection

Buy Now
Questions 31

The long-term (more than 60 days) process of restoration activities after an emergency or disaster that returns the organization to its pre-event condition is called:

Options:

A.

Business continuity

B.

Business recovery

C.

Business resumption

D.

Business healing

Buy Now
Questions 32

The purpose of methodical examination is to:

Options:

A.

Find deviations from established security standards and practices

B.

Find loopholes in security controls

C.

consider means of improving the efficiency or control of the operation without reducing security

D.

All of the above

Buy Now
Questions 33

Reserves are the people standing by in the event that assistance is needed by security personnel on fixed posts or patrol; duty.

Options:

A.

True

B.

False

Buy Now
Questions 34

In which approach of comparative negligence, the plaintiff may collect something for injuries even if he or she was primarily responsible for the injuries?

Options:

A.

Pure approach

B.

50/50 rule

C.

51 percent rule

D.

None of the above

Buy Now
Questions 35

In its organizational functions, security encompasses which basic activities with varying degrees of emphasis?

Options:

A.

managerial, detective, preventive, investigative

B.

supervising, administrative, preventive, training

C.

managerial, training, preventive, detective

D.

managerial, administrative, preventive, investigative

Buy Now
Questions 36

What are wide-beam units, primarily used to extend the illumination in long, horizontal strips to protect the approaches to the perimeter barrier?

Options:

A.

Floodlights

B.

Search lights

C.

Perimeter lighting

D.

Fresnel Lenses

Buy Now
Questions 37

A solicitation by police officers is another charge that may be leveled against security officers is called:

Options:

A.

Criminal liability

B.

Wrongful death

C.

Verdict Act

D.

Entrapment

Buy Now
Questions 38

What is defines as using the identity information of another person to commit fraud or engage in other unlawful activities?

Options:

A.

Identity fraud

B.

Identity theft

C.

Identity dissemination

D.

Identity Distortion

Buy Now
Questions 39

Which of eth following is NOT the type of insurance?

Options:

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Privacy Invasion

Buy Now
Questions 40

What is the authorized physical invasion of property or remaining on property after permission has been rescinded?

Options:

A.

Prosecution

B.

Trespass

C.

Verdict

D.

None of the above

Buy Now
Questions 41

Nechaev defined _____________ as in which a man who is already lost, has broken all links with society and the world of civilization, with its laws and conventions, with its social etiquette and its moral code.

Options:

A.

Transformation

B.

Terrorism

C.

Revolution

D.

Consolation

Buy Now
Questions 42

Administrative workload is substantially decreased when which service is employed?

Options:

A.

Union

B.

Security

C.

Proprietary

D.

Contract

Buy Now
Questions 43

The process of finding the person best qualified for the job in terms of both skills and personal integrity is known as:

Options:

A.

Inspection

B.

Recruitment

C.

Vetting

D.

Screening

Buy Now
Questions 44

Communism has common property and radical Islam has sharing property

Options:

A.

True

B.

False

Buy Now
Questions 45

Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.

Options:

A.

True

B.

False

Buy Now
Questions 46

Unintentional access to software code is referred to as:

Options:

A.

Bomb

B.

Trapdoor

C.

Backdoor

D.

Trojan Horse

Buy Now
Questions 47

The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?

Options:

A.

International terrorism

B.

Modern terrorism

C.

Modern Revolutionary

D.

Modern War weapons

Buy Now
Questions 48

A good risk management program involves:

Options:

A.

Identify risks or specific vulnerabilities

B.

Analyze and study risks, including likelihood and degree of danger of an event

C.

Study of security programs

D.

All of the above

Buy Now
Questions 49

Which records provide detailed, documented records of an applicant’s personal history, background, and financial relationships?

Options:

A.

Legal action

B.

Civil lawsuit

C.

Civil litigation

D.

All of the above

Buy Now
Questions 50

What is an operational method in which the very act of the attack is dependent upon the death of the perpetrator?

Options:

A.

Time bomb attack

B.

Terrorist attack

C.

Suicide attack

Buy Now
Questions 51

LANs and WANs can communicate with each other using a communications rule called:

Options:

A.

Ethernet Protocol packet

B.

Protocol Assembly packet

C.

XOP.210 Protocol packet

D.

Internet Protocol packet

Buy Now
Questions 52

When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:

Options:

A.

Financial authority

B.

Control authority

C.

Staff authority

D.

Dominance authority

Buy Now
Questions 53

A system in which installation circuits are connected to local police or fire departments or 911 centers by leased telephone lines is called;

Options:

A.

Central station

B.

Proprietary system

C.

Local alarm system

D.

Auxiliary system

Buy Now
Questions 54

IP sends information across networks in packets, each containing between 1 and approximately:

Options:

A.

1,000 characters

B.

12, 00 characters

C.

15, 00 characters

D.

18, 00 characters

Buy Now
Exam Code: PSP
Exam Name: Planning & Scheduling Professional (PSP) Exam
Last Update: Nov 23, 2024
Questions: 120

PDF + Testing Engine

$134.99

Testing Engine

$99.99

PDF (Q&A)

$84.99