Package deal
ASIS PSP TESTS COMPILATION BUNDLE
ASIS PSP TESTS COMPILATION BUNDLE
[Show more]ASIS PSP TESTS COMPILATION BUNDLE
[Show more]What are the 3 Risk Identification elements? 
Assets, exposure, losses 
What are 3 factors in a cost/benefit analysis? 
1) Cost, 2) Reliability - evidence of the benefits for example benchmarking, 3) Delay, meaning the costs of time to make it operational. 
Basic methods of field work 
Observing, qu...
Preview 3 out of 20 pages
Add to cartWhat are the 3 Risk Identification elements? 
Assets, exposure, losses 
What are 3 factors in a cost/benefit analysis? 
1) Cost, 2) Reliability - evidence of the benefits for example benchmarking, 3) Delay, meaning the costs of time to make it operational. 
Basic methods of field work 
Observing, qu...
__% of human communication is verbal 
__% is tonality 
__% is physiology (body language) correct answers 7, 38, 55 
 
__% of all "I'll think it over"s means no correct answers 92 
 
R-A-P-P-O-R-T stands for correct answers Really All People Prefer Others Reflecting Themselves 
 
Top 20% ...
Preview 2 out of 6 pages
Add to cart__% of human communication is verbal 
__% is tonality 
__% is physiology (body language) correct answers 7, 38, 55 
 
__% of all "I'll think it over"s means no correct answers 92 
 
R-A-P-P-O-R-T stands for correct answers Really All People Prefer Others Reflecting Themselves 
 
Top 20% ...
What are the two foundational design principles? correct answers The Four D's (Deter, Detect, Delay, Deny), 
Layered security (defense in depth) 
 
The point where the delay time remaining exceeds the response force time is known as what? correct answers Critical detection point. 
 
What is t...
Preview 3 out of 21 pages
Add to cartWhat are the two foundational design principles? correct answers The Four D's (Deter, Detect, Delay, Deny), 
Layered security (defense in depth) 
 
The point where the delay time remaining exceeds the response force time is known as what? correct answers Critical detection point. 
 
What is t...
What act was passed in 2002 as a result of the Enron scandal and requires greater financial exposure? correct answers Sarbanes-Oxley Act 
 
What was C. West Churchman's contribution to security? correct answers Created a centralized approach to problem solving in an organization. 
 
Who is ac...
Preview 2 out of 5 pages
Add to cartWhat act was passed in 2002 as a result of the Enron scandal and requires greater financial exposure? correct answers Sarbanes-Oxley Act 
 
What was C. West Churchman's contribution to security? correct answers Created a centralized approach to problem solving in an organization. 
 
Who is ac...
American Society for Industrial Security(ASIS) correct answers this group was formed in 1955 by a group of security professionals, the group is dedicated to protecting the people, property, and info assets of a diverse group of private and public organizations, its members include management prof...
Preview 2 out of 5 pages
Add to cartAmerican Society for Industrial Security(ASIS) correct answers this group was formed in 1955 by a group of security professionals, the group is dedicated to protecting the people, property, and info assets of a diverse group of private and public organizations, its members include management prof...
Response Force Time = correct answers Delay Remaining to Asset 
 
Response Force Time definition correct answers Time it takes to get from Critical Detection Point to the Asset. 
 
Critical Detection Point correct answers Detect by this point in order to get bad guy before he gets to asset ...
Preview 1 out of 2 pages
Add to cartResponse Force Time = correct answers Delay Remaining to Asset 
 
Response Force Time definition correct answers Time it takes to get from Critical Detection Point to the Asset. 
 
Critical Detection Point correct answers Detect by this point in order to get bad guy before he gets to asset ...
The degree of protection desired in any installation is predicated upon an analysis of the following two factors: correct answers Criticality and Vulnerability 
 
Thr process used by the security manager in establishing priorities of protection of assets is known as: correct answers Vulnerabil...
Preview 2 out of 5 pages
Add to cartThe degree of protection desired in any installation is predicated upon an analysis of the following two factors: correct answers Criticality and Vulnerability 
 
Thr process used by the security manager in establishing priorities of protection of assets is known as: correct answers Vulnerabil...
What are the eight main categories of physical security measures? correct answers 1. CPTEDn2. Physical barriers and site hardeningn3. Physical entry and access controln4. Security lightingn5. Intrusion detection systemsn6. Video surveillancen7. Security personneln8. Security policie...
Preview 3 out of 28 pages
Add to cartWhat are the eight main categories of physical security measures? correct answers 1. CPTEDn2. Physical barriers and site hardeningn3. Physical entry and access controln4. Security lightingn5. Intrusion detection systemsn6. Video surveillancen7. Security personneln8. Security policie...
What is measured in output of light (lumens) compared to power input (watts)? correct answers Lamp Efficacy. 
 
What would you use to control glare in a small area? correct answers Low-Mounted Site Lighting. 
 
Which type of light fixture would you use on buildings where aesthetic appeal is ne...
Preview 2 out of 12 pages
Add to cartWhat is measured in output of light (lumens) compared to power input (watts)? correct answers Lamp Efficacy. 
 
What would you use to control glare in a small area? correct answers Low-Mounted Site Lighting. 
 
Which type of light fixture would you use on buildings where aesthetic appeal is ne...
Classification of Risk correct answers Asset, exposure, losses 
 
3 Criteria of Cost/Benefit analysis correct answers Cost, reliability, delay 
 
Basic methods of fieldwork correct answers Observing, questioning, analyzing, verifying, investigating, evaluating 
 
Business continuity plannin...
Preview 4 out of 44 pages
Add to cartClassification of Risk correct answers Asset, exposure, losses 
 
3 Criteria of Cost/Benefit analysis correct answers Cost, reliability, delay 
 
Basic methods of fieldwork correct answers Observing, questioning, analyzing, verifying, investigating, evaluating 
 
Business continuity plannin...
ALE correct answers Annual Loss Expectancy 
 
ALE = correct answers SLE+Annualized Rate of Occurance 
 
CLE (CLM ) correct answers Cumulative Expectancy or Model 
 
CLE correct answers All incidents for a year, their probability and then derive expected loss 
 
SLE correct answers Sin...
Preview 2 out of 6 pages
Add to cartALE correct answers Annual Loss Expectancy 
 
ALE = correct answers SLE+Annualized Rate of Occurance 
 
CLE (CLM ) correct answers Cumulative Expectancy or Model 
 
CLE correct answers All incidents for a year, their probability and then derive expected loss 
 
SLE correct answers Sin...
Physical Security Survey correct answers The process to gather the Who, What, When, Where and Why of the client's operation. 
A Fact Finding mission 
 
Purpose of Physical Security Survey correct answers Identify all critical factors. 
The facts, gaps and needs. Recommendations 
 
Physical ...
Preview 2 out of 13 pages
Add to cartPhysical Security Survey correct answers The process to gather the Who, What, When, Where and Why of the client's operation. 
A Fact Finding mission 
 
Purpose of Physical Security Survey correct answers Identify all critical factors. 
The facts, gaps and needs. Recommendations 
 
Physical ...
Four types of fencing correct answers • Chain-link (Most commonly used for security delay of 3 to 5 seconds) 
• Barbed wire 
• Concertina 
• Barbed tape 
 
What are the Specifications regarding use of chain-link fences? correct answers 7 foot tall material excluding top guard 
9 gauge ...
Preview 4 out of 40 pages
Add to cartFour types of fencing correct answers • Chain-link (Most commonly used for security delay of 3 to 5 seconds) 
• Barbed wire 
• Concertina 
• Barbed tape 
 
What are the Specifications regarding use of chain-link fences? correct answers 7 foot tall material excluding top guard 
9 gauge ...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller Classroom. Stuvia facilitates payment to the seller.
No, you only buy these notes for $30.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
81298 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now