ASIS ASIS-APP Questions & Answers

Full Version: 224 Q&A



ASIS-APP Dumps
ASIS-APP Braindumps
ASIS-APP Real Questions
ASIS-APP Practice Test
ASIS-APP Actual Questions


ASIS
ASIS-APP
Associate Protection Professional
https://killexams.com/pass4sure/exam-detail/ASIS-APP
Question: 1
What is the ‘span of control’ principle?
A. A single person can supervise only a limited number of staff members effectively (generally up to 6)
B. A single person can supervise only a limited number of staff members effectively (generally up to 8)
C. A single person can supervise only a limited number of staff members effectively (generally up to 12)
D. A single person can supervise only a limited number of staff members effectively (generally up to 10)
Answer: D
Question: 2
What is the design C basis threat?
A. The cost incurred for the utility being protected. It is used to help design and evaluate a physical protection system
(PPS)
B. The adversary against which the utility must be insured against. It is used to help design and evaluate a physical
protection system (PPS) by the CISO
C. The cost incurred for the person being protected.
D. The adversary against which the utility must be protected. It is used to help design and evaluate a physical
protection system (PPS)
Answer: D
Question: 3
What is a mutual aid association?
A. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other
by providing materials, equipment, and personnel for disaster control during emergencies.
B. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other
by providing materials, equipment, and personnel for disaster control during emergencies on a cost basis.
C. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other
by providing materials, equipment, and personnel for disaster control during emergencies at cost for the duration of the
arrangement
D. A mutual aid association is an arrangement by which businesses and other organisations agree to assist each other
by providing materials, equipment, and personnel for disaster control during emergencies. It is subject to the limit of
the emergency.
Answer: A
Question: 4
Which of the following is an advantage of having investigation conducted by in-house security staff?
A. In-house staff has better grasp as to objective of the investigation
B. Cheaper as a general rule, depending on number of check being done
C. In-house staff has better sources of information
D. In-house staff is better trained
Answer: A
Question: 5
What is a Business impact analysis (BIA)?
A. A BIA is a tool used to: Identify an entity’s critical functions Assess the impact of a disaster or emergency on those
functions over time Determine the other elements of the business on which those critical functions depend Help
develop and prioritize recovery strategies
B. A BIA is a tool used to: Identify an entity’s communication structure Assess the impact of a disaster or emergency
on those functions over time Determine the other elements of the business on which those critical functions depend
Help develop and prioritize recovery strategies
C. A BIA is a tool used to: Identify an entity’s critical functions Assess the impact of a disaster or emergency on those
functions over time Determine the other elements of the business on which those critical functions depend Help
develop the cost associated with the emergency
D. A BIA is a tool used to: Identify key stakeholders Assess the impact of a disaster or emergency on those functions
over time Determine the other elements of the business on which those critical functions depend Help develop and
prioritize recovery strategies
Answer: A
Question: 6
What are the three contributors to cost of replacement?
A. Repair and Replacement cost Freight and Shipping charges Make C ready or preparation cost to install it or make it
functional
B. Insurance Cost Freight and Shipping charges Make C ready or preparation cost to install it or make it functional
C. Upgrade Cost including replacement fee Freight and Shipping charges Make C ready or preparation cost to install it
or make it functional
D. Purchase price or manufacturing cost Freight and Shipping charges Make C ready or preparation cost to install it or
make it functional
Answer: D
Question: 7
What is the ‘necessary human being’ concept?
A. The particular characteristics and reactions required at a security post necessitate human capabilities
B. Dependant characteristics of a human operating a security system
C. The particular characteristics and reactions required at a security post that do not necessitate human capabilities
D. The particular characteristics and reactions required at a security post that can be recovered and upgraded by
mechanical means
Answer: A
Question: 8
What are the four approaches to terrorism analysis?
A. Multicausal Political Organisational Psychological
B. Geopolitical Political Organisational Psychological
C. Historical Political Organisational Psychological
D. Financial Political Organisational Psychological
Answer: A
Question: 9
What are the four types of emergency drill formats?
A. Tabletop exercise Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies
B. Tabletop exercise Evacuation/shelter in place drill Comms walkthrough Full exercise with outside response agencies
C. Lead exercise Evacuation/shelter in place drill Plan walkthrough Full exercise with outside response agencies
D. Tabletop exercise with Law Enforcement Evacuation/shelter in place drill Plan walkthrough Full exercise with
outside response agencies
Answer: A
Question: 10
In investigations, what’s the difference between an analysis diagram and a horizontal diagram?
A. An analysis diagram links details regarding persons, events, etc during an investigation. A horizontal diagram
compares different periods of a company’s financial statement that will be beneficial during a fraud investigation
B. An analysis diagram links details regarding property and events A horizontal diagram compares different periods of
a company’s security statement that will be beneficial during a fraud investigation
C. An analysis diagram links details regarding timeline, incidents and events, etc during an investigation. A horizontal
diagram compares different sections of a company’s annual loss statement that will be beneficial during a fraud
investigation
D. An analysis diagram links details the reporting chain used during an investigation, that includes the CSO and the
COO A horizontal diagram compares different periods of a company’s financial statement that will be beneficial
during a fraud investigation
Answer: A
Question: 11
What are indirect costs to security?
A. Harm to Reputation Loss of goodwill Loss of employees Harm to employee morale
B. Harm to Reputation Loss of goodwill Loss of employees Insurance Costs
C. Increased Alarm Rates Indirect Career Progression Loss of employees Harm to employee morale
D. Harm to Reputation Loss of goodwill Loss of contract Harm to Business
Answer: A
Question: 12
According to Fennelly, what are the three key tools in crime prevention programs?
A. Planning Management Cost
B. Planning Management Evaluation
C. Planning Management Availability
D. Planning Management Communication
Answer: B
Question: 13
Any person may affect an arrest without warrant when he/she
A. Has reasonable grounds to believe that an individual has committed a criminal offence and is escaping from and
freshly pursued by persons who have lawful authority to arrest that individual
B. Has reasonable grounds to believe that the individual will fail to attend court
C. Has reasonable grounds to believe that a person has committed an indictable offence
D. Finds an individual committing any offence
Answer: A
Question: 14
What is the formula for lost income cost?
A. I = i/365 x P x t, where: I = Income earned I = annual percent loss of return P = Principal amount) in dollars)
available for investment t = time (in days) during which P is available for investment
B. I = i/365 x P x t, where: I = Income lost I = annual percent rate of return P = Principal amount) in dollars) available
for investment t = time (in days) during which P is available for investment
C. I = i/365 x P x t, where: I = Income earned I = annual percent rate of return P = Principal amount) in dollars)
available for investment t = time (in days) during which P is available for investment
D. I = i/365 x P x t, where: I = Income earned I = annual percent rate of return P = Principal amount) in dollars) lost
on investment t = time (in days) during which P is available for investment
Answer: C
Question: 15
Why are emergency management tests and exercises conducted?
A. To check workability of the plan To determine levels of staff awareness and training To evaluate emergency
communications To identify shortcomings in evacuation procedures
B. To check the cost of the plan To determine levels of staff awareness and training To evaluate emergency
communications To identify shortcomings in evacuation procedures
C. To check workability of the plan To determine levels of compliance To evaluate emergency communications To
identify shortcomings in evacuation procedures
D. To check workability of the plan To determine levels of staff awareness and training To review communications
strategy To identify shortcomings in evacuation procedures
Answer: A
Question: 16
How do aggressors decide to commit workplace violence?
A. Not by ‘snapping’, but through a process of emotional escalation, or, with psychopaths, non-emotional decision
making
B. Through planned action
C. By ‘snapping’ as a result of perceived injustice
D. In response to a confirmed slight or ‘wrong’
Answer: A
Question: 17
What organisation is the world’s largest developer of international standards?
A. ASIS
B. WHO
C. ISO, the International Organisation for Standardisation
D. European Union
Answer: C
Question: 18
What is the most important relationship for security during a strike?
A. The relationship with local law enforcement
B. The relationship with unions
C. The relationship with HR & Legal
D. The relationship between law enforcement and legal
Answer: A
Question: 19
What are the three primary functions of security lighting?
A. Deterrence Life safety Video lighting
B. Deterrence Incident Recording Video lighting
C. Prevention and Retention Life safety Video lighting
D. Incident Management Life safety Video lighting Video lighting
Answer: A
Question: 20
Who should have access to the emergency telephone numbers of key personnel?
A. Staff in control centres Senior personnel with plan implementation responsibilities
B. Security personnel in control centres Senior personnel with plan implementation responsibilities
C. Staff in control centres Legal personnel with plan implementation responsibilities
D. Staff in control centres Emergency Management personnel with plan implementation responsibilities
Answer: A
Question: 21
What are the two most commonly abused drugs in the workplace?
A. #1 Alcohol #2 Marijuana
B. #1 Alcohol #2 Nicotine
C. #1 Nicotine #2 Marijuana
D. #1 Alcohol #2 PCP
Answer: A
Question: 22
How long do the effects of controlled release OxyContin last?
A. 8 to 12 hours
B. 10 to 12 hours
C. 8 to 14 hours
D. 8 to 16 hours
Answer: A
Question: 23
What are the five phases of an undercover operation?
A. Planning and preparation Information gathering C operative placed Verification and analysis C operative removed
Discipline and corrective action Prevention and education
B. Law Enforcement Engagement Information gathering C operative placed Verification and analysis C operative
removed Discipline and corrective action Prevention and education
C. Planning and preparation Information gathering C operative placed Verification and analysis C operative removed
Legal Action Prevention and education
D. Planning and preparation Information gathering C operative placed Verification and analysis C operative removed
Discipline and corrective action Law Enforcement engagement
Answer: A
Question: 24
What are the four stages of an investigative reporting process?
A. Initial report Progress report (within 30 days of initial report) Special report Final report
B. Initial report Progress report (within 20 days of initial report) Special report Final report
C. Initial report Progress report (within 40 days of initial report) Special report Final report
D. Initial report Progress report (within 50 days of initial report) Special report Final report
Answer: A
Question: 25
What is key to a sound back story of an undercover operative?
A. Personal details that are not true but are known to the targeted employee, such as schools attended, former
workplaces, or previous home neighbourhoods
B. Plausible & realistic
C. One that is easily remembered
D. A detailed history with a verifiable background
Answer: A
Question: 26
What is the vulnerability assessments team’s primary job as it pertains to a physical protection system (PPS)?
A. To determine security system effectiveness.
B. To secure a site
C. To record system violations
D. To determine the alarm response ratio
Answer: A
Question: 27
What is the best way to prepare for workplace misconduct investigations?
A. Coordinate as soon as possible with the HR director and corporate legal counsel because of the possibility of
employee legal action
B. Source a secure location to conduct interviews
C. Review the initiation report
D. Coordinate with Law Enforcement and Legal Counsel
Answer: A
Question: 28
When should a supervisor visit a security post?
A. Regularly, in an unscheduled manner
B. Once per hour
C. Twice per hour
D. Six times during 9 hour shift
Answer: A
Question: 29
What type of specimen is analysed most often in drug tests?
A. Urine
B. Hair
C. Saliva
D. Blood
Answer: A
Question: 30
What are the three standard financial reports?
A. Income statement Balance sheet Statement of cash flows
B. Income statement Bank statement Statement of cash flows
C. Income statement Balance sheet Statement of assets
D. Income statement Balance sheet Share value
Answer: A
Question: 31
How frequently should investigative summaries of undercover operations be produced?
A. Typically, summaries are prepared after the operative has completed 10 consecutive days of work
B. Typically, summaries are prepared after the operative has completed 20 consecutive days of work
C. Typically, summaries are prepared after the operative has completed 30 consecutive days of work
D. Typically, summaries are prepared after the operative has completed 25 consecutive days of work
Answer: A
Question: 32
What does an income statement show?
A. Revenue Expenses Statement of Assets
B. Revenue Expenses Share value
C. Revenue Expenses Closing balance
D. Revenue Expenses Net income over a defined period
Answer: D
Question: 33
What is the current ratio?
A. The current ratio is a measure of a company’s ability to cover medium term obligations Current ratio = current
assets/current liabilities
B. The current ratio is a measure of a company’s ability to cover long term obligations Current ratio = current
assets/current liabilities
C. The current ratio is a measure of a company’s ability to cover immediate obligations Current ratio = current
assets/current liabilities
D. The current ratio is a measure of a company’s ability to cover short term obligations Current ratio = current
assets/current liabilities
Answer: D
Question: 34
What are the three general measures to valuing assets?
A. Cost Consequence criteria Policy
B. Insurance Fees Consequence criteria Policy
C. Asset Liability Consequence criteria Policy
D. Value of the Assets Consequence criteria Policy
Answer: A
Question: 35
Selection devices in the personnel selection process used by managers to reduce accept and reject errors include
A. Performance-simulation tests, application forms, resume, interviews
B. Application form, resume, pencil and paper tests, interviews
C. Performance-simulation tests, drug screening, applications form, resume
D. Application form, pencil and paper tests, performance-simulation tests, interviews
Answer: A
Question: 36
What does a cash flow statement show?
A. Available funds to the organisation
B. How cash inflows and outflows affect an organisation
C. Funds due to the organisation
D. Available funds allocated for the financial year
Answer: B
Question: 37
A claimant’s allegation of invasion of privacy would be appropriately supported in a situation where the alleged
perpetrator:
A. Revealed damaging information from a police file to the claimant’s spouse
B. Revealed further details about a matter that was reported in a published biography of the claimant
C. Mentioned during a televised interview a rumor about the claimant engaging in criminal activity
D. Repeated a story that the claimant was overheard telling in a crowded public place
Answer: A
Question: 38
Which of the following is not true with regard to door latches?
A. Both B and C
B. Chain latches are highly recommended as effective security measures
C. A dead-bolt latch is very expensive
D. A dead-bolt latch increases the security posture of the facility
Answer: A
Question: 39
What is the overall objective of an investigation?
A. A successful outcome or resolution of the case
B. To secure a conviction
C. To recover stolen items
D. To identify those involved in a crime
Answer: A
Question: 40
What are the three managerial dimensions of assets protection?
A. Technical expertise Management ability Communications
B. Academic Qualifications Management ability Ability to deal with people
C. Technical expertise Operational ability Ability to deal with people
D. Technical expertise Management ability Ability to deal with people
Answer: D
Question: 41
In the development of a security program using the systems approach, the three general elements that must be given
consideration are:
A. A vulnerability analysis, implementation of countermeasures, and a test of the operating program
B. The installation of fencing, locks, and alarms
C. Pre-employment screening, policies, and standardized procedure
D. A loss prevention program, risk analysis, and recovery documentation
Answer: A
Question: 42
What system reduces the possibility that a facility badge can be counterfeited, lost, or stolen?
A. 62 Bit Encryption
B. Proximity Badge
C. 32 Bit Encryption
D. An exchange badge system
Answer: D
Question: 43
What is perhaps the best way to achieve funding for an Investigations Unit (IU)?
A. Demonstrate how the unit pays for itself
B. Provide case statistics
C. Direct from Physical Security Budget
D. Demonstrate successful case load
Answer: A
Question: 44
The cardinal rule in management of a transportation concern is that those assigned to line hauling duties must be
A. Willing and able to discuss their cargo
B. In possession of extra cargo seals
C. Capable of lifting more than 50 lbs.
D. Of the highest integrity
Answer: A
Question: 45
How many years of prior work history should a job application ask for?
A. At least 7 to 10 years
B. At least 7 to 12 years
C. At least 7 to 15 years
D. At least 12 to 15 years
Answer: A
Question: 46
What are post orders based on?
A. Legal Guidelines
B. Standard Operating Procedures
C. Client Needs
D. Location and hours of work
Answer: B
Question: 47
Why might companies keep secret the existence of kidnap, ransom, and extortion policies from their personnel?
A. To avoid being targeted
B. To prevent negative press
C. To comply with company legislation
D. To ensure alignment
Answer: A
Question: 48
A well-engineered physical protection system (PPS) exhibits which three characteristics?
A. Protection in Depth Minimum consequence of component failure (redundancy) 360 Coverage
B. Protection in Depth Minimum consequence of component failure (redundancy) Balanced protection
C. Protection in Depth Minimum consequence of component failure (redundancy) Power Redundancy
D. Protection in Depth Layered Perimeter Utility Support
Answer: B
Question: 49
What are the three ways to measure profit margins?
A. Gross profit margin = (revenue C cost of goods bought C general and administrative costs)/revenue Operating
margin = EBITA (earnings after interest, taxes, and amortization)/ revenue
B. Gross profit margin = (revenue C cost of goods bought C general and administrative costs)/revenue Operating
margin = EBITA (earnings before interest, taxes, and amortization)/ revenue
C. Gross profit margin = (revenue C cost of goods sold C general and administrative costs)/revenue Operating margin
= EBITA (earnings before interest, taxes, and amortization)/ revenue
D. Gross profit margin = (revenue C cost of goods sold C general and administrative costs)/revenue Operating margin
= EBITA (earnings after interest, taxes, and amortization)/ revenue
Answer: C
Question: 50
According to Oatman, what are the six principles that should guide thinking about executive protection?
A. Prevent and avoid danger Realize that anyone can protect anyone Don’t stop to think Keep clients out of trouble
Understand the security vs convenience continuum Rely on technology
B. Prevent and avoid danger Realize that anyone can protect anyone Stop to think Keep clients out of trouble
Understand the security vs convenience continuum Rely on brains, not on technology
C. Prevent and avoid danger Only team members can protect anyone Stop to think Keep clients out of trouble
Understand the security vs convenience continuum Rely on brains, not on technology
D. Prevent and avoid danger Realize that anyone can protect anyone Don’t stop to think Keep clients out of trouble
Understand the security vs convenience continuum Rely on brains, not on technology
Answer: D
Question: 51
What are the four main types of CCTV cameras?
A. Standard analog CCD Dome Infrared Thermal
B. Standard analog CCD IP Infrared Thermal
C. Standard analog CCD Bullet Infrared Thermal
D. Standard analog CCD Fixed Infrared Thermal
Answer: B
Question: 52
How long should a strategic plan look out into the future?
A. Three to ten years
B. Three to six years
C. Three to five years
D. Three to seven years
Answer: C
Question: 53
What is the preferred glass type for mitigating blast forces?
A. Laminated glass is preferred for mitigating blast forces
B. Sheet Glass
C. Plexiglass
D. Single reinforced glazing
Answer: A
Question: 54
What are the four main strategies of second generation CPTED (the four C’s) ?
A. Cohesion Capacity threshold (tipping point) Creativity Connectivity
B. Cohesion Capacity threshold (tipping point) Communication Connectivity
C. Cohesion Capacity threshold (tipping point) Community culture Connectivity
D. Cohesion Capacity threshold (tipping point) Collaboration Connectivity
Answer: C
Question: 55
What are the elements of a systems approach to developing a physical protection system (PPS)?
A. Assessment of needs Implementation of countermeasures Evaluation of effectiveness
B. Assessment of vulnerability Implementation of countermeasures Evaluation of effectiveness
C. Assessment of vulnerability Evaluation of effectiveness and Defence in Depth
D. Assessment of needs Implementation of countermeasures Evaluation of effectiveness
Answer: B
Question: 56
In what situation is protecting investigative information particularly difficult?
A. Protecting information can be difficult when working with joint task forces, because each participating agency
likely has different policies, definitions, perspectives, and attitudes towards what is sensitive and warrants protection
B. Protecting information can be difficult when working with joint task forces, because each participating agency will
have different information handling and storage programs
C. Protecting information can be difficult when working with joint task forces, because each participating agency
likely will be reporting to individual stakeholders none of whom are in the same reporting chain
D. Protecting information can be difficult when working with joint task forces, because each participating agency can
be subject to competing multi-jurisdictional legal oversight issues
Answer: A
Question: 57
When is the best time to remove an undercover operative?
A. When he or she is named as an offender by co-workers
B. Outside of working hours
C. On approval from LE
D. On approval from HR & Legal
Answer: A
Question: 58
How should change or corrections be made in officers written log entries?
A. Entered in Red Ink and signed by Security Officer & Manager
B. Entered in Red Ink
C. Entered in Red Ink and signed by Security Officer
D. Under a new event number as a separate item
Answer: D
Question: 59
What is the quick ratio?
A. The quick ratio is a measure of an organisations ability to cover current liabilities with current assets that be quickly
converted to cash Quick ratio = (cash + securities + accounts receivable)/current liabilities
B. The quick ratio is a measure of an organisations ability to cover projected liabilities with current assets that be
quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/projected liabilities
C. The quick ratio is a measure of an organisations ability to cover future liabilities with current assets that be quickly
converted to cash Quick ratio = (cash + securities + accounts receivable)/future liabilities
D. The quick ratio is a measure of an organisations ability to cover current liabilities with borrowed assets that be
quickly converted to cash Quick ratio = (cash + securities + accounts receivable)/borrowed liabilities
Answer: A
Question: 60
What kind of legal privilege is typically granted to properly controlled investigative reports?
A. Qualified privilege, protecting against defamation suits
B. Qualified privilege, Protection against criminal prosecution
C. Personal Injury protection, protecting against defamation suits
D. Qualified privilege, protection against investigation
Answer: A
Question: 61
According to the FBI, what are the six steps of protecting a business from espionage?
A. Recognise the (insider or outsider) threat Identify and value trade secrets Implement a proactive plan for protecting
trade secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’
Train employees on intellectual property protection
B. Recognise the (insider or outsider) threat Close Trade secrets Implement a proactive plan for protecting trade secrets
Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train
employees on intellectual property protection
C. Recognise the (insider or outsider) threat Identify and value trade secrets Implement Disaster Recovery Plans Secure
physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train employees on
intellectual property protection
D. Recognise the (insider or outsider) threat Define Key Stakeholders Implement a proactive plan for protecting trade
secrets Secure physical and electronic versions of trade secrets Confine intellectual knowledge to ‘need to know’ Train
employees on intellectual property protection
Answer: A
Question: 62
What three questions does a risk assessment attempt to answer?
A. What Protocols currently exist? What is the likelihood it would go wrong? What are the consequences?
B. What can go wrong? What is the cost associated? What are the consequences?
C. What resources are available? What is the likelihood it would go wrong? What are the consequences?
D. What can go wrong? What is the likelihood it would go wrong? What are the consequences?
Answer: D
Question: 63
What are the three types of CPTED solutions?
A. Mechanical measures Electronic Lighting and Direction of Flow
B. Legal Guidelines Human and organisational measures Natural measures
C. Mechanical measures Human and organisational measures Lighting and Direction
D. Mechanical measures Human and organisational measures Natural measures
Answer: D
Question: 64
How many years of experience should a new investigative hire have?
A. As a rule of thumb, new hires should have at least two years of experience conducting investigations
B. As a rule of thumb, new hires should have at least three years of experience conducting investigations
C. As a rule of thumb, new hires should have at least four years of experience conducting investigations
D. As a rule of thumb, new hires should have at least five years of experience conducting investigations
Answer: A
Question: 65
What is the best way to recruit a good candidate for a job?
A. Internal recommendations
B. Open competitions
C. Direct Appointments
D. Closed competitions
Answer: A
Question: 66
What three factors should determine selection of a CCTV camera?
A. Sensitivity Degradation Features
B. Sensitivity Resolution Features
C. Sensitivity Degradation Timing
D. Resolution Degradation Timing
Answer: B
Question: 67
What does a balance sheet show?
A. A summary of an organisations investing and financing
B. A summary of an organisations profits and loss
C. A summary of an organisations share value
D. A summary of an organisations RSU schedule
Answer: A
Question: 68
What are the three levels of assessment for violent risk among known subjects?
A. Initial Threshold Comprehensive
B. Initial Threshold Violent
C. Initial Assessment Comprehensive
D. Immediate Threshold Comprehensive
Answer: A
Question: 69
In Pastor’s public/private, substitute/supplement model of policing, which cell represents the rarest scenario?
A. Public/Private
B. Private/Industrial
C. Public/Substitute
D. Private/Substitute
Answer: C
Question: 70
What are the main functions of a physical protection system (PPS)?
A. The primary functions are detection, delay, and record. Deterrence is a secondary function.
B. The primary functions are direct, delay, and response. Deterrence is a secondary function.
C. The primary functions are determine, delay, and response. Deterrence is a secondary function.
D. The primary functions are detection, delay, and response. Deterrence is a secondary function.
Answer: D
Question: 71
What is ‘minimum resolvable temperature’?
A. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an
intruder, activity and the background.
B. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between
staged sensors
C. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an
intruder and the site environment.
D. The detection threshold for passive infrared (PIR) sensors, calculated from the difference in temperature between an
intruder and the background.
Answer: D
Question: 72
What are the two general types of insurance?
A. Personal Accidental
B. Property Liability
C. Property Travel
D. Property Accidental
Answer: B
Question: 73
What are the three primary functions of a physical protection system (PPS)?
A. Detection Delay Response
B. Assess Report Response
C. Record Deny Respond
D. Identify Deny Respond
Answer: A
Question: 74
Where are executives most vulnerable to attack?
A. At home
B. At work
C. In transit
D. While exercising
Answer: A
Question: 75
What theory underpins situational crime prevention?
A. Motive and Opportunity
B. Geo political theory
C. Criminal Law
D. Rational choice theory
Answer: D
Question: 76
For insurance against business interruption, what are the two types of valuation methods?
A. Perceived loss sustained Valued loss
B. Actual loss sustained Valued loss
C. Actual loss sustained Insured loss sustained
D. Actual loss sustained Incurred replacement cost
Answer: B
Question: 77
What are three major pitfalls of using online information sources for investigations?
A. Going off on a tangent/spending too much time online Assuming online information is credible without exploring
further Searching online sources may not be best use of an investigator’s time
B. Reliability Accuracy Safety
C. Robustness Legal Considerations Search Parameters
D. Reliability Accuracy Security of source
Answer: A
Question: 78
What are the five basic coverages of crime insurance policy?
A. Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage
outside the premises Money order and counterfeit paper currency coverage Harassment Bond
B. Employee Injury bond Money and securities coverage inside the premises Money and securities coverage outside
the premises Money order and counterfeit paper currency coverage Depositors forgery coverage
C. Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage
outside the premises Money order and counterfeit paper currency coverage Depositors forgery coverage
D. Employee dishonesty bond Money and securities coverage inside the premises Money and securities coverage
outside the premises Money order and counterfeit paper currency coverage Theft and forgery coverage
Answer: C
Question: 79
What is generally the most practical approach to budget development?
A. A combination of top down and bottom up processes and mutual forecasting
B. A top down approach
C. A bottom up approach
D. A combination of top down and bottom up processes
Answer: D
Question: 80
Which of the following is not generally true regarding money safes?
A. Both C & D
B. Those manufactured prior to 1960 have round doors
C. They provide good protection against fire
D. They always have wheels
Answer: A
Question: 81
What is the biggest vulnerability of a loop system?
A. All the detectors in an area could be disabled by interrupting the loop at the proper location
B. Physical Intervention
C. Power interruption
D. Detectors not being recorded on a system
Answer: A
Question: 82
What are the three ways of verifying personnel entry?
A. Who you are (role) What you know (PIN, password) What you have (badge)
B. Who you are (role) What you know (PIN, password) What you are (biometrics)
C. What you have (credential) What you know (PIN, password) What you are (biometrics)
D. What you have (credential) What you carry (YubiKey) What you are (biometrics)
Answer: C
Question: 83
During a trip with a principle, what are the three key concepts for an executive protection (EP) specialist to remember?
A. Keep a low profile Stay away from problem areas and situations Know what to do if trouble arises
B. Keep a low profile Stay away from problem areas and situations Contact Law Enforcement
C. Keep a low profile Stay away from problem areas and situations Secure transport
D. Keep a low profile Define scope of ops Know what to do if trouble arises
Answer: A
Question: 84
In its basic sense, the investigative process reflects
A. A simple statement of all the abstracts encountered
B. The mindset of the investigator
C. Precise controlled examination
D. Absolute goal-oriented inquiry
Answer: A
Question: 85
Who is the person responsible for maintaining and archiving closed case files, including all notes, reports and
summaries?
A. The custodian of record
B. The security manager
C. The HR Rep
D. The Project Manager
Answer: A
Question: 86
What are the three most common methods of training protection dogs?
A. Positive reinforcement (praise) Compulsion (negative corrections) Inducement (toys, foods)
B. Positive reinforcement (praise) Compulsion (negative corrections) Punishment (corrections)
C. Positive reinforcement (praise) Communication (talking) Inducement (toys, foods)
D. Repeated Performance (repeat exercise) Compulsion (negative corrections) Inducement (toys, foods)
Answer: A
Question: 87
What are the five Ds of security?
A. Divide Deny Detect Delay Destroy
B. Defend Deny Detect Delay Destroy
C. Define Deny Detect Delay Destroy
D. Deter Deny Detect Delay Destroy
Answer: D
Question: 88
Field welds and brazing on factory boxes, enclosures, and conduits should be coated with what?
A. Cold galvanized paint containing at least 95 percent zinc by weight
B. Cold galvanized paint containing at least 75 percent zinc by weight
C. Cold galvanized paint containing at least 65 percent zinc by weight
D. Cold galvanized paint containing at least 55 percent zinc by weight
Answer: A
Question: 89
What is the ‘broken windows’ theory?
A. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti
and trash, unattended or unrepaired can lead to the impression of abandonment and increase crime opportunity because
no capable guardian (i.e. security presence) is observed.
B. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti
and trash, unattended or unrepaired can lead to the impression of the drop in value of a site
C. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti
and trash, unattended or unrepaired can lead to the impression of higher costs associated with security services
D. The theory proposed by Kelling and Wilson that leaving broken windows or other markers of decay, such as graffiti
and trash, unattended or unrepaired can lead to a reduction of Law Enforcement patrolling and response to a location
Answer: A
Question: 90
What is a Trademark
A. Legal protection for words, names, symbols, devices, or images applied to products or used in connection with
goods or services to identify their source.
B. Legal protection for a property right granted to an inventor to exclude others from making, using, offering for sale,
or selling the invention for a limited time.
C. Legal protection of the expression of ideas in corporate law and policy.
D. Legal protection of the expression of ideas in literary, artistic, and musical works.
Answer: A
Question: 91
Who should be responsible for shutting down equipment in an emergency?
A. Those already familiar with the process.
B. Senior Engineer on Duty
C. All Security Personnel
D. Chief Security Officer on duty
Answer: A
Question: 92
According to Davidov and Malone, what is the centrepiece of the new global economy?
A. The relationship between economics, security and policy
B. Economics and Technology
C. Vendor Ownership and Management Process recognition
D. The virtual product, where major business functions are outsourced with hardly any internal departmentalization.
Answer: D
Question: 93
What are the three types of attacks used to defeat an access-controlled entry point?
A. Deceit Physical attack Technical attack
B. Social Engineering Physical attack Technical attack
C. Assault Physical attack Technical attack
D. Bribery Physical attack Technical attack
Answer: A
Question: 94
What four questions does risk management attempt to answer?
A. What can be done? What options are available? What are the associated trade-offs in terms of costs, benefits, and
risks? What are the impacts of current management decisions on future options?
B. What is the cost? What options are available? What are the associated trade-offs in terms of costs, benefits, and
risks? What are the impacts of current management decisions on future options?
C. What can be done? What protocols are available? What are the associated trade-offs in terms of costs, benefits, and
risks? What are the impacts of current management decisions on future options?
D. Who is responsible for completing the Risk Management matrix? What options are available? What are the
associated trade-offs in terms of costs, benefits, and risks? What are the impacts of current management decisions on
future options?
Answer: A
Question: 95
What are the three classifications of loss in Insurance policies?
A. Direct Loss Loss of use Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)
B. Indirect Loss Loss of use Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)
C. Direct Loss Replacement Cost Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)
D. Indirect Loss Replacement Cost Extra C expense loss (e.g., cost of defending a liability suit or paying a judgement)
Answer: A
Question: 96
What are the five most common identifiers used to verify education history in a background check?
A. Name while attending school Dates of attendance Graduation date Degree obtained Date of birth
B. Name of primary school Dates of attendance Graduation date Degree obtained Date of birth
C. Name while attending school Dates of attendance Qualification attained Degree obtained Date of birth
D. Name while attending school Dates of attendance Country of Birth Degree obtained Date of birth
Answer: A
Question: 97
What value does company prosecution of employee drug offenses have?
A. Minimal value
B. More than $1000
C. More than $1500
D. Value less than $2000
Answer: A
Question: 98
What is the debt to equity ratio?
A. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total
liabilities/shareholder securities
B. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total
liabilities/shareholder liabilities
C. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total
liabilities/shareholder equity
D. The debt to equity ratio is a measure of a company’s long term financial health Debt to equity ratio = total
liabilities/shareholder accounts
Answer: C
Question: 99
In an investigation, what is generally the best reporting chain from the source of information to the decision maker?
A. The shortest one
B. Direct to CISO
C. Direct to LE Partner
D. To the Project Management Team
Answer: A
Question: 100
The three basic types of glass are
A. Tinted, reflective, and insulated
B. Heavy duty, medium duty and light duty
C. Tempered, reinforced and coated
D. Sheet, plate, and float
Answer: A
Question: 101
What are the five avenues of addressing risk?
A. Analysis Transfer Spreading Reduction Acceptance
B. Replacement Transfer Spreading Reduction Acceptance
C. Avoidance Transfer Spreading Reduction Acceptance
D. Review Transfer Spreading Reduction Acceptance
Answer: C
Question: 102
A major concern of a company, above all else, should be
A. The care and well-being of its employees
B. Reduction of shrinkage
C. Policies and procedures
D. Internal theft
Answer: A
Question: 103
What is natural territorial reinforcement?
A. Natural territorial reinforcement is the process of establishing a sense of ownership, responsibility, and
accountability in property owners, managers, or occupants to increase vigilance in identifying trespassers.
B. Construction of environmental barriers
C. Natural territorial reinforcement is the process of integrating property with lighting
D. Natural territorial reinforcement is the process of establishing a reporting system tied to a monitoring station
Answer: A
Question: 104
What are the three types of emergency operations plans?
A. All hazards Standalone (different for reach emergency) Combination of all-hazards and standalone
B. Medical hazards Standalone (different for reach emergency) Combination of all-hazards and standalone
C. Natural Hazards Standalone (different for reach emergency) Combination of all-hazards and standalone
D. Artificial hazards Standalone (different for reach emergency) Combination of all-hazards and standalone
Answer: A
Question: 105
What are the most common type of investigations in business settings?
A. Incident investigations
B. Harassment Investigations
C. Assault investigations
D. Theft Investigations
Answer: A
Question: 106
What is the best way to addressing infringements of copyrights, patents, and trademarks?
A. By registering those rights
B. By securing a trademark
C. By security a copyright
D. By securing a Patent
Answer: A
Question: 107
Which stakeholder group drives the ANSI standards development process?
A. Consumers
B. Government
C. Industry Experts and Academics
D. Standards users
Answer: D
Question: 108
What two ratios show how an organisation has done in making money during a reporting period?
A. Return on assets = net income/total assets Return on equity = net income/shareholder equity
B. Return on assets = net income/total shares Return on equity = net income/shareholder equity
C. Return on assets = net shares/total shares Return on equity = net income/shareholder equity
D. Return on assets = net income/total assets Return on equity = net outcomes/shareholder equity
Answer: A
Question: 109
Which two ratios demonstrate how well a firm has done in making money for a reporting period?
A. Return on assets = net assets/total assets Return on equity = net income/shareholder equity
B. Return on assets = net income/total assets Return on equity = net income/shareholder equity
C. Return on assets = net income/total assets Return on equity = net outgoings/shareholder equity
D. Return on assets = net income/total equity Return on equity = net income/shareholder equity
Answer: B
Question: 110
What members should comprise a vulnerability assessment team?
A. Security specialist (leader) Security Systems engineer Response expert Data analyst Operations Representatives
Subject matter experts (locksmiths, technical writers, legal experts)
B. Security specialist (leader) Security Systems engineer Response expert HR expert Operations Representatives
Subject matter experts (locksmiths, technical writers, legal experts)
C. Security specialist (leader) Security Systems engineer Response expert CFO Operations Representatives Subject
matter experts (locksmiths, technical writers, legal experts)
D. Security specialist (leader) Security Systems engineer Response expert CISO Operations Representatives Subject
matter experts (locksmiths, technical writers, legal experts)
Answer: B
Question: 111
How long does withdrawal from narcotics take?
A. 7 to 10 days
B. 7 to 12 days
C. 7 to 14 days
D. 7 to 16 days
Answer: A
Question: 112
Who should be involved in developing a standard?
A. A broad group of stakeholders and interested parties, working collaboratively
B. Industry Experts
C. Industry Experts and Academics
D. Public and Private partnership
Answer: A
Question: 113
What organisation is the administrator and coordinator of the US private sector voluntary standardization system?
A. The American National Standards Academy (ANSA)
B. The American National Standards Institute (ANSI)
C. ASIS
D. The American National Standards Organisation (ANSO)
Answer: B
Question: 114
What are the first steps in upgrading a facility’s resistance to penetration?
A. Defence in Depth
B. Layered Protection
C. Eliminating unnecessary doors and windows
D. Technical Protection measures
Answer: C
Question: 115
What are the five principal resources of an Investigations Unit (IU)?
A. People Information Credibility Physical assets Financial assets
B. People Information Analysis Physical assets Financial assets
C. People Information Intelligence Physical assets Financial assets
D. Systems Information Credibility Physical assets Financial assets
Answer: A
Question: 116
How many workplace violence incidents are committed annually by intimates of the victim?
A. 18,700
B. 18,500
C. 18,000
D. 19,000
Answer: A
Question: 117
What are the thee most critical threats in high-rise structures?
A. Fire Explosion Terrorism
B. Fire Explosion Personnel
C. Fire Explosion Infrastructure Damage
D. Fire Explosion Contamination of support systems
Answer: D
Question: 118
What is the cost of loss formula?
A. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of temporary insurance Ct =
cost of temporary substitute Cr = total related costs Ci = lost income costs I = available insurance or indemnity a =
allocable insurance premium amount
B. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent insurance Ct =
cost of temporary substitute Cr = total related costs Ci = lost income costs I = available
insurance or indemnity a = allocable insurance premium amount
C. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent replacement Ct =
cost of temporary substitute Cr = total related costs Ci = lost income costs I = available insurance or indemnity a =
allocable insurance premium amount
D. K = (Cp + Ct + Cr + Ci) C (I- a), where: K = criticality, total cost of loss Cp = cost of permanent replacement Ct =
cost of temporary substitute Cr = total insurable costs Ci = lost income costs I = available insurance or indemnity a =
allocable insurance premium amount
Answer: C
Question: 119
What is an effective way of setting the value of line items in a budget?
A. Look at each budget expense as an investment and calculate the expected return on that investment
B. Look at each budget expense as an investment and reduce the expected return on that investment
C. Look at each budget expense as an investment and divide the expected return on that investment
D. Look at each budget expense on its own and calculate the expected return on projected investments
Answer: A
Question: 120
How often should an emergency operations plan be audited?
A. At least annually. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and
policy changes.
B. At least quarterly. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and
policy changes.
C. On demand. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and
policy changes.
D. Periodically. Evaluations should occur after drills, emergencies, personnel changes, facility design changes and
policy changes.
Answer: A
Question: 121
What are the five elements of the Incident Command System?
A. Command Operations Planning Logistics Finance and administration
B. Command Communications Planning Logistics Finance and administration
C. Command Operations Legal Logistics Finance and administration
D. Command Operations Planning Logistics HR
Answer: A
Question: 122
What are the immediate effects of cocaine use?
A. Dilated pupils Elevated blood pressure Increased heart rate Euphoria
B. Impaired reflexes Slurred speech Uncontrollable drowsiness
C. Impaired reflexes Anger Uncontrollable drowsiness
D. Impaired reflexes Slurred speech Detached interest
Answer: A
Question: 123
What are the four elements of emergency management?
A. Mitigation Preparedness Response Recovery
B. Communication Preparedness Response Recovery
C. Mitigation Preparedness Resilience Recovery
D. Mitigation Preparedness Response Reduction
Answer: A
Question: 124
Under what three conditions should undercover investigations definitely NOT be used?
A. To investigate activity permitted or protected by law To replace a less costly form of investigation that will yield
the same results To investigate protected union activities
B. To investigate medical negligence cases To replace a less costly form of investigation that will yield the same
results To investigate protected union activities
C. To investigate activity permitted or protected by law To replace a less costly form of investigation that will yield the
same results To investigate Law Enforcement incidents
D. To investigate activity permitted or protected by law To investigate activities associated with minors To investigate
protected union activities
Answer: A
Question: 125
What three elements are depicted in a cash flow statement?
A. Net operating cash flow Net investing cash flow Pending funds due
B. Net operating cash flow Net investing cash flow End of year statement
C. Net operating cash flow Net investing cash flow Expected cash flow
D. Net operating cash flow Net investing cash flow Financing cash flow
Answer: D
Question: 126
What are the three levels of investigative management?
A. Strategic Operational Case
B. Strategic Pivotal Case
C. Personal Operational Case
D. Commercial Operational Case
Answer: A
Question: 127
Who should be involved in developing a job requirements analysis?
A. The hiring manager HR Team Legal Team
B. The hiring manager HR Team Organisational leaders
C. The hiring manager Other team members Organisational leaders
D. The hiring manager HR Team Security Liaison
Answer: C
Question: 128
Who is the only corporate official who should retain a copy of an investigative report?
A. The attorney of record
B. CISO
C. Law Enforcement
D. Security Manager
Answer: A
Question: 129
What are some effects of depressants in large doses?
A. Impaired reflexes Slurred speech Uncontrollable drowsiness
B. Impaired reflexes Anger Uncontrollable drowsiness
C. Impaired reflexes Slurred speech Detached interest
D. Hunger and thirst Slurred speech Uncontrollable drowsiness
Answer: A
Question: 130
Department of Defense regulations regarding the protection of classified information requires that defense contractors
maintain accountability of top secret information for a minimum time of:
A. Three years
B. Two years
C. Five years
D. One year
Answer: A
Question: 131
At what size and how far above the ground should an opening in a buildings shell be protected?
A. Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 centimetres)
and are lower that 18 feet (5.5 metres) above the ground.
B. Reinforce or secure any openings in the building shell that measure more than 100 square inches and are lower that
18 feet above the ground.
C. Reinforce or secure any openings in the building shell that measure more than 80 square inches and are lower that
18 feet (5.5 metres) above the ground.
D. Reinforce or secure any openings in the building shell that measure more than 96 square inches (619 centimetres)
and are lower that 20 feet (6 metres) above the ground.
Answer: A
Question: 132
How many subjects should a single post order cover?
A. Three
B. Two
C. One
Answer: C
Question: 133
Searches made during work hours as a result of a bomb threat call should be made by
A. Employees familiar with the work area where the bomb is reportedly located
B. The fire department
C. The local police department
D. The Department of Army personnel
Answer: A
Question: 134
What are the three goals of preemployment interviews?
A. Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Allow
transfer of missing information from the applicant to the employer Permit an assessment of the candidate
B. Candidate selection Allow transfer of missing information from the applicant to the employer Permit an assessment
of the candidate
C. Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Verification
of credentials Permit an assessment of the candidate
D. Convey critical information to the applicant to discourage unqualified applicants and encourage honesty Allow
transfer of missing information from the applicant to the employer Exam Job History
Answer: A
Question: 135
What is CPTED?
A. CPTED, or crime prevention through environmental design is the design or redesign of a venue to maximise access
to a site
B. Physical Barriers on a site
C. Electronic, Physical and Procedural designs
D. CPTED, or crime prevention through environmental design is the design or redesign of a venue to reduce crime
opportunity and fear of crime through natural, mechanical, or procedural means.
Answer: D
Question: 136
When is containment a good strategy?
A. When theft is the adversary’s goal. Containment involves preventing the adversary from leaving the site with stolen
items.
B. When assisted by Law Enforcement
C. When access to firearms is available
D. When there is company fraud or embezzlement
Answer: A
Question: 137
Who should be assigned the role of an organisations emergency coordinator?
A. Someone regularly responsible for handling emergencies, such as the head of security or engineering.
B. Someone regularly responsible for handling emergencies, such as the Business Continuity Manager.
C. Someone regularly responsible for handling emergencies, such as the head of crisis management
D. Someone regularly responsible for handling emergencies, such as the COO.
Answer: A
Question: 138
What are the three main limitations of financial statement analysis?
A. It doesn’t consider changes in market conditions All organisations operate in similar markets Financial reports must
be accurate for financial ratios to have meaning
B. It doesn’t consider changes in market conditions All organisations operate differently and target different markets
Financial reports must be accurate for financial ratios to have meaning
C. It considers changes in market conditions All organisations operate differently and target different markets
Financial reports must be accurate for financial ratios to have meaning
D. It considers changes in market conditions All organisations operate in similar markets Financial reports must be
accurate for financial ratios to have meaning
Answer: B
Question: 139
What is the underlying equation of the balance sheet?
A. Assets = liabilities + stock
B. Assets = liabilities + shareholder equity
C. Assets = liabilities + stock cost
D. Assets = liabilities + shareholder equity + RSU cost
Answer: B
Question: 140
One of the following is not prohibited by the Federal Civil Rights Act during an investigation:
A. Asking questions about prior convictions
B. Directing inquiry into areas of religion or sex for discriminatory purposes
C. Directing inquiry into areas of race or color for discriminatory purposes
D. Asking questions about prior arrests
Answer: A
Question: 141
What are the five pillars of ISO standards?
A. Equal footing of members Market need Consensus Voluntary participation and application Worldwide applicability
B. Equal footing of members Direction of Market Consensus Voluntary participation and application Worldwide
applicability
C. Equal footing of members Direction of Market Global alignment Voluntary participation and application Worldwide
applicability
D. Equal footing of members Direction of Market Economic Need Voluntary participation and application Worldwide
applicability
Answer: A
Question: 142
Wired glass is intended to provide resistance to
A. Knives and hammers
B. Shattering and fragmentation
C. Bullets or other high-energy missiles
D. Fire
Answer: A
Question: 143
What departments are typically involved in preemployment background screening?
A. Human resources Security Business units Legal
B. Finance Security Business units Legal
C. Human resources Security Vendor manager Legal
D. Business Continuity Security Business units Legal
Answer: A
Question: 144
What is sometimes referred to as the private sector version of emergency management?
A. Business continuity
B. Resilience
C. Disaster Recovery
D. Emergency Protocol
Answer: A
Question: 145
What should be the primary basis for camera selection?
A. The sensitivity required for a full video output signal under optimal conditions
B. Location
C. Site Selection and Cost accrued
D. The sensitivity required for a full video output signal in the lighting environment in the area to be assessed
Answer: D
Question: 146
What three factors are driving the growth of private policing?
A. Economic and operational issues (Fear of) crime and violence Order maintenance
B. Economic and operational issues (Fear of) crime and violence Cost replacement
C. Economic and operational issues Access to firearms Order maintenance
D. Legal and Security issues (Fear of) crime and violence Order maintenance
Answer: A
Question: 147
What are the four key challenges to watch for when operating within a joint task force?
A. Parochialism Protection of sensitive information Data management Reporting chains
B. Jurisdiction Protection of sensitive information Data management Reporting chains
C. Parochialism GDPR Data management Reporting chains
D. Data Sources Chain security Data management Reporting chains
Answer: A
Question: 148
Who should make up the investigative team for an undercover investigation?
A. A corporate decision maker An HR representative A corporate security professional An attorney familiar with
employment law
B. CISO/COO An HR representative A corporate security professional An attorney familiar with employment law
C. A corporate decision maker An LE representative A corporate security professional An attorney familiar with
employment law
D. LE Rep, CISO, & CFO An HR representative A corporate security professional An attorney familiar with
employment law
Answer: A
Question: 149
What are the three force multipliers in investigations?
A. Online information sources (e.g. commercial databases) Liaison (e.g. joint task forces) Intelligence information (e.g.
informants)
B. Personnel Processes Intelligence information
C. Personnel Processes Protocols
D. Personnel Processes Liaison
Answer: A
Question: 150
What is the rule of thumb for allocating for spare parts purchases in a budget?
A. About 5 percent of the capital cost of equipment for a location should be allocated each year for spare parts
B. About 6 percent of the capital cost of equipment for a location should be allocated each year for spare parts
C. About 7 percent of the capital cost of equipment for a location should be allocated each year for spare parts
D. About 9 percent of the capital cost of equipment for a location should be allocated each year for spare parts
Answer: A
Question: 151
What is unity of command?
A. An individual should only report to only one supervisor
B. An individual can report to more than one supervisor
C. An individual should not only report to only one supervisor
D. An individual can report to multiple leads if the operation demands
Answer: A
Question: 152
Assets protection is increasingly based on what principle?
A. Risk management.
B. Insurance Cost
C. Legal requirement
D. Cost of replacement
Answer: A
Question: 153
What is OPSEC?
A. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect critical
information. It responds to the fact that small bits of information from different sources can be combined to reveal
sensitive information
B. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect personal
identifiable information. It responds to the fact that small bits of information from different sources can be combined
to reveal sensitive information
C. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect business
specific information that relates directly to the company. It responds to the fact that small bits of information from
different sources can be combined to reveal sensitive information
D. OPSEC, (operational security) is a simple and systematic method of employing safeguards to protect critical
government information. It specifically refers to national level information and intelligence and how it should be
stored, shared and destroyed
Answer: A
Question: 154
Which kind of investigations cannot be done without police assistance?
A. Ones involving illegal drugs
B. Ones involving minors
C. Ones involving union activity
D. Ones involving multi-jurisdictional activities
Answer: A
Question: 155
What is the most fundamental form of communication in undercover assignments?
A. Written reports
B. Telephone Reports
C. Email
D. Verbal Brief
Answer: A
Question: 156
In executive protection (EP), what is an advance?
A. The process of researching a destination before the principal arrives
B. Moving vehicles forward
C. Responding to an active threat
D. Protecting the client from live fire
Answer: A
Question: 157
What are the five basic functions of management?
A. Planning Organisation Delegating Coordinating Controlling
B. Planning Organisation Directing Coordinating Referral
C. Planning Hiring Directing Coordinating Controlling
D. Planning Organisation Directing Coordinating Controlling
Answer: D
Question: 158
The Law of Torts deals with
A. Intentional acts and negligent acts
B. Negligence and inadvertent conduct that cause damage or injury
C. Trademark infringement
D. Torts against persons and torts against property
Answer: A
Question: 159
What is colour rendition?
A. The ability of a lamp to identify colours seen in an object
B. The ability of a lamp to record the colours seen in an object
C. The ability of a lamp to faithfully reproduce the colours seen in an object
D. The ability of a lamp to minimise and reduce the colours seen in an object
Answer: C
Question: 160
Unclassified material should be marked:
A. With no marking
B. "Unclassified" at the top of the page
C. "Unclassified" at the top and bottom of the page
D. "Unclassified" at the bottom of the page
Answer: A
Question: 161
When should an undercover investigation be used?
A. An undercover investigation is appropriate only when no other alternatives are available and the company can
reasonably expect a significant return on investment
B. When there is a suspicion of drug dealing
C. An undercover investigation is appropriate when law enforcement direct
D. When there is company fraud or embezzlement
Answer: A
Question: 162
What is the chain of action that must occur if a principal is attacked?
A. Arm’s reach (immobilize attacker if within arm’s reach, otherwise cover the principal) Sound off (shout the weapon
displayed and the direction, in relation to the principal, from which it is coming) Cover Evacuate
B. Protect the client from live fire
C. Move to vehicles
D. Contact Law Enforcement for assistance
Answer: A
Question: 163
What are the five forces shaping assets protection globally?
A. Collaboration in Systems Globalisation in business Standards and regulation Convergence of security solutions
Homeland security and international security environment
B. Visualisation and Connectivity Globalisation in business Standards and regulation Convergence of security
solutions Homeland security and international security environment
C. Technology and touch Globalisation in business Standards and regulation Convergence of security solutions
Homeland security and international security environment
D. Emergency Management Standards and regulation Convergence of security solutions Homeland security and
international security environment
Answer: C
Question: 164
Which two earnings C related ratios are commonly examined in financial analysis?
A. Earnings per share = net income/total shares Price to earnings = price per share/earnings per share
B. Earnings per share = net assets/total shares Price to earnings = price per share/earnings per share
C. Earnings per share = net income/total shares Price to earnings = price per share/earnings after sales
D. Earnings per share = net income/total shares Price to earnings = price per share/earnings per quarter
Answer: A
Question: 165
What are the most challenging problems in international investigations?
A. Cultural differences create challenges in international investigations
B. Conflicting legal obligations from multi-jurisdictional locations
C. Data Protection and GDPR obligations
D. Identifying a single mechanism for the sharing of operational information
Answer: A
Question: 166
Who should be made aware of the existence of an undercover investigation?
A. Only those with an absolute need to know
B. CISO, CFO & HR
C. CISO, CFO, HR, and Legal only
D. Law Enforcement
Answer: A
Question: 167
At a minimum, who should be part of the workplace violence incident management team (IMT)?
A. A senior management representative A senior HR manager A senior security manager A legal representative
familiar with labour and employment law
B. A senior management representative A senior HR manager The CISO A legal representative familiar with labour
and employment law
C. A LE representative A senior HR manager A senior security manager A legal representative familiar with labour
and employment law
D. A union representative A senior HR manager A senior security manager A legal representative familiar with labour
and employment law
Answer: A
Question: 168
What is the most important consideration when a security person deals with a disturbed person?
A. Bringing the person into custody and eliminating immediate danger
B. Evacuating the area
C. Contacting Law Enforcement
D. Placing the site into Lockdown status
Answer: A
Question: 169
What is a Patent?
A. A Patent is a property right granted to an inventor to exclude others from making, using, offering for sale, or selling
the invention for a limited time.
B. Legal protection for words, names, symbols, devices, or images applied to products or used in connection with
goods or services to identify their source.
C. Legal protection of the expression of ideas in literary, artistic, and musical works.
D. A Patent is a the hereditary right granted to an inventor to exclude others from making, using, offering for sale, or
selling the invention for a limited time.
Answer: A
Question: 170
Why should colour be used sparingly in graphical alarm displays?
A. Because 10 percent of the population has some form of colour blindness
B. Because 5 percent of the population has some form of colour blindness
C. Because 15 percent of the population has some form of colour blindness
D. Because 13 percent of the population has some form of colour blindness
Answer: A
Question: 171
According to Peter Drucker, what is the most crucial question in defining business purpose and mission?
A. Who is the customer?
B. What is the goal?
C. Who is responsible?
D. What is the product?
Answer: A
Question: 172
What four situations do workplace misconduct investigations typically address?
A. Conflict of interest Corporate resource abuse/theft Workplace violence Substance abuse
B. Conflict of interest Sexual Assault Workplace violence Substance abuse
C. Defamation Corporate resource abuse/theft Workplace violence Substance abuse
D. Embezzlement Corporate resource abuse/theft Workplace violence Substance abuse
Answer: A
Question: 173
What are the three basic stages of addiction?
A. Increased tolerance to the drug Increased rationalization and lying Obsession with the substance
B. Anger Uncontrollable drowsiness
C. Impaired reflexes Slurred speech Detached interest
D. Hunger and thirst Slurred speech Uncontrollable drowsiness
Answer: A
Question: 174
What kinds of companies are particularly vulnerable to counterfeiting and piracy?
A. Start-ups Early stage firms Small and medium size companies that are rich in intangible assets
B. Start-ups Pre IPO Small and medium size companies that are rich in intangible assets
C. Start-ups Early stage firms Tech Firms
D. Start-ups & Financial Institutions Tech Firms Small and medium size companies that are rich in intangible assets
Answer: A
Question: 175
What is the effective range of MANPADS?
A. 1 to 3.5 kilometres (0.06 to 2.2 miles)
B. 1 to 4.5 kilometres (0.06 to 2.8 miles)
C. 1 to 5.5 kilometres (0.06 to 4 miles)
D. 1 to 6 kilometres (0.06 to 5 miles)
Answer: A
Question: 176
What is a primary benefit of zero-based budgeting?
A. Zero based budgeting may force managers to consider alternative ways of getting the job done
B. Zero based budgeting may force managers to consider seeking alternate funding
C. Zero based budgeting may force managers to request additional supports
D. Zero based budgeting may force managers to consider streamlining the operation
Answer: A
Question: 177
What is the best source of a protection dog?
A. A reputable professional breeder.
B. Through ASIS programs
C. Through online adverts
D. Through personal referral
Answer: A
Question: 178
A capacitance sensor is an electric condenser that radiates
A. Energy
B. Heat
C. Light
D. Sound
Answer: A
Question: 179
Which is the most important type of screening investigation process in a corporate organization
A. Data security
B. Theft
C. Background
D. Security violation
Answer: A
Question: 180
What is the main potential problem in an undercover investigation?
A. The possibility that the investigation will be exposed or compromised
B. Discovery and assault
C. Clear reporting chains
D. Cost involved
Answer: A
Question: 181
On what should the decision of whether to arm an officer be based?
A. Budgeting and Training
B. Whether there is greater danger to life safety without a weapon Whether the officer may reasonably be expected to
use fatal force
C. Local Legislation and availability of firearms
D. Availability of competent trained personnel
Answer: B
Question: 182
What elements constitute the Investigation lifecycle?
A. Initiation Investigation Reporting & Results
B. Incident Report Investigation Reporting & Results
C. Analysis Investigation Reporting & Results
D. Initiation Investigation Determination
Answer: A
Question: 183
Inquiries about an investigation can be connected to the investigative results by means of
A. Ordering
B. Grouping
C. Classification
D. Indexing
Answer: A
Question: 184
The term for a strike that occurs when management and unions fail to negotiate an agreement on benefits is
A. Unfair labour practice
B. Wildcat
C. Right to Work
D. Economic
Answer: A
Question: 185
Who should make up the project management team for an undercover investigation?
A. Undercover investigator Project manager Client representative Corporate attorney Law enforcement representative
(if necessary)
B. Undercover investigator HR manager Security representative Corporate attorney Law enforcement representative (if
necessary)
C. Senior Company Rep HR manager Security representative Corporate attorney Law enforcement representative (if
necessary)
D. Union Rep HR manager Security representative Corporate attorney Law enforcement representative (if necessary)
Answer: A
Question: 186
What is the operating principle of ISO’s management systems standards?
A. The Plan-Do-Check-Act cycle
B. Direction and Coordination
C. Organisational Demand
D. International alignment
Answer: A
Question: 187
What two values describe sensor effectiveness?
A. Location of Sensor Lighting
B. Probability of detection Lighting
C. Location of Sensor Confidence level
D. Probability of detection Confidence level
Answer: D
Question: 188
What is a Copyright?
A. Legal protection of the expression of ideas in literary, artistic, and musical works.
B. Legal protection for words, names, symbols, devices, or images applied to products or used in connection with
goods or services to identify their source.
C. Legal protection for a property right granted to an inventor to exclude others from making, using, offering for sale,
or selling the invention for a limited time.
D. Legal protection of the expression of ideas in corporate law and policy.
Answer: A
Question: 189
What are the three primary objectives of emergency management?
A. Minimize the probability of an emergency Mitigate the impact of the emergency Recover from the emergency and
resume normal operations
B. Minimize the probability of an emergency Mitigate the impact of the emergency Recover from the emergency and
prepare the communications plan
C. Minimize the probability of a reoccurrence Mitigate the impact of the emergency Recover from the emergency and
resume normal operations
D. Minimize the probability of an emergency Mitigate the cost of the emergency Recover from the emergency and
resume normal operations
Answer: A
Question: 190
What is good practice to make sure a guest wears a badge while on the premises?
A. Explain to the person that the badge permits immediate recognition by and assistance from employees
B. Identification of approved guests and employees
C. Explain to the person that the badge must be worn otherwise they will have to leave the site
D. Explain to the person that the badge is a legal requirement
Answer: A
Question: 191
How is the response function of a physical protection system (PPS) measured
A. The response function of a PPS is measured by the time between receipt of communication of adversary action and
the arrest of the adversary
B. The response function of a PPS is measured by the time between the alarm time and incident closure
C. The response function of a PPS is measured by the time between receipt of communication of adversary action and
the arrival of law enforcement
D. The response function of a PPS is measured by the time between receipt of communication of adversary action and
the interruption of the adversary action
Answer: D
Question: 192
What is the biggest challenge in investigating workplace misconduct issues?
A. Getting employees to report wrongdoing
B. GDPR Alignment
C. Legal Oversight
D. Coordinate with Law Enforcement and Legal Counsel
Answer: A
Question: 193
How does the progression of interviews differ between regular investigations and undercover investigations?
A. In regular investigations, the interview process closes in on the perpetrators over time. Undercover investigations
begin with those most involved and work towards those less involved
B. Undercover investigations are not legally covered outside the company
C. Undercover investigations cannot be used to reclaim company assets
D. In regular investigations LE assistance may be necessary. In undercover investigations LE assistance is prohibited
unless approved by Legal
Answer: A
Question: 194
What is the least understood and most underused form of investigation?
A. Undercover investigations
B. Fraud Investigations
C. Assault investigations
D. Personal Injury
Answer: A
Question: 195
What are the effects of large doses of cocaine?
A. Bizarre behaviour Tremors Vertigo Muscle twitches Paranoia Toxic reaction
B. Craving Loss of control Physical dependence Tolerance
C. Impaired reflexes Slurred speech Uncontrollable drowsiness
D. Impaired reflexes Anger Uncontrollable drowsiness
Answer: A
Question: 196
What are general orders?
A. Guidelines for Operations
B. Canons, or bodies of principles, for protection officers (e.g. No smoking on duty)
C. Suggested Guidelines for protection officers
D. Recommended guidelines and principles, for protection officers (e.g. No smoking on duty)
Answer: B
Question: 197
What is ‘working the principal’?
A. The choreography used by an executive protection specialist to physically move about with the principal.
B. Moving vehicles forward
C. Responding to an active threat
D. Protecting the client from live fire
Answer: A
Question: 198
What are the four symptoms of alcohol dependence?
A. Craving Loss of control Physical dependence Tolerance
B. Impaired reflexes Slurred speech Uncontrollable drowsiness
C. Impaired reflexes Anger Uncontrollable drowsiness
D. Craving Loss of control Anger Tolerance
Answer: A
Question: 199
What are a company’s top two valuable resources?
A. #1 C employees #2 C assets
B. #1 C employees #2 C corporate knowledge
C. #1 C C Level Execs #2 C corporate knowledge
D. #1 C employees #2 C Profit & Loss statement
Answer: B
Question: 200
Which of the following substances would induce poor perception of time and distance
A. Hallucinogens
B. Stimulants
C. Narcotics
D. Depressants
Answer: A
Question: 201
For effective bulk explosive detection, how often must a person be screened by low dose backscatter x-ray devices?
A. Twice
B. Three times
C. Four Times
D. Once
Answer: A
Question: 202
What are the two most popular breeds of protection dogs in the United States?
A. German Shepherd Doberman Pincher
B. German Shepherd Alsation
C. German Shepherd Husky
D. Labrador Cross Doberman Pincher
Answer: A
Question: 203
What are the five qualities that characterise an effective, reliable investigation?
A. Objectivity Thoroughness Relevance Accuracy Timeliness
B. Objectivity Communication Relevance Accuracy Timeliness
C. Objectivity Thoroughness Relevance Experience Timeliness
D. Objectivity Thoroughness Analysis Accuracy Timeliness
Answer: A
Question: 204
What four major areas does assets protection cover in the telecommunications sector?
A. Information security Network/computer security Fraud prevention Physical security
B. Information security Network/computer security Business Continuity Physical security
C. Information security Emergency Management Fraud prevention Physical security
D. Information security Network/computer security Fraud prevention Physical Intervention
Answer: A
Question: 205
What should every job offer be based on?
A. Satisfactory completion of preemployment background checks
B. Personal recommendation
C. Medical screening
D. Completion of training program
Answer: A
Question: 206
What are the two key measurements for the effectiveness of the detection function of a physical protection system?
(PPS)
A. Probability of sensing adversary action and Implementation of effective countermeasures
B. Target identification and Isolation of the incident
C. Implementation of countermeasures Evaluation of effectiveness
D. Probability of sensing adversary action, Time required for reporting and assessing the alarm.
Answer: A
Question: 207
In setting up a proprietary investigative unit, the most important aspect to consider is the:
A. Number of personnel
B. Budgeting for staff
C. Selection of professional personnel
D. Specialized training of the applicant
Answer: A
Question: 208
What is the process by which an employer verifies the experience and qualifications presented by a job candidate?
A. Credentialing
B. Background Check
C. Screening
D. Verification
Answer: A
Question: 209
What are the two basic analytical approaches to a risk assessment?
A. Compliance based and Descriptive
B. Quantitively and Qualative
C. Metrics and Graphical
D. Compliance based Performance based
Answer: D
Question: 210
What are the four approaches to situational crime prevention?
A. Increase the effort required (e.g. target hardening, access control), Increased artificial lighting Reduced anticipated
rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule
setting)
B. Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry
screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling) Remove excuses (e.g.
deploy signage stimulating the conscious, rule setting)
C. Increase the effort required (e.g. target hardening, access control), Investment in CPTED Reduced anticipated
rewards (e.g. target removal, property labelling) Remove excuses (e.g. deploy signage stimulating the conscious, rule
setting)
D. Increase the effort required (e.g. target hardening, access control), Increase the risk of being caught (e.g. entry
screening, surveillance) Reduced anticipated rewards (e.g. target removal, property labelling)
Answer: B
Question: 211
What is defensible space?
A. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical
construction of a residential environment that would encourage residents to proactively report all security incidents and
events in the local environment
B. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical
construction of a residential environment could elicit behaviour from residents that would contribute significantly to
their safety. It directly leads to increased costs associated with security services
C. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical
construction of a residential environment would prevent residents from reporting security incidents or events
D. The foundation of CPTED, defensible space is a concept developed by Oscar Newman positing that physical
construction of a residential environment could elicit behaviour from residents that would contribute significantly to
their safety. It includes real and symbolic barriers, strongly defined areas of influence, and improved opportunities for
surveillance.
Answer: D
Question: 212
What is the typical initiation event in a private sector incident investigation?
A. An incident report
B. Alarm activation
C. Law Enforcement report
D. Confidential Informant
Answer: A
Question: 213
What five guidelines should be observed for workplace drug purchases that are part of an investigation?
A. Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases
on company time Avoid actual drug use
B. Qualify the dealer Coordinate with Law Enforcement Buy down, not up (purchase a small amount) Make purchases
on company time Record all transactions
C. Qualify the dealer Coordinate with Legal Buy down, not up (purchase a small amount) Make purchases on
company time Avoid actual drug use
D. Qualify the dealer Coordinate with Legal & HR Buy down, not up (purchase a small amount) Make purchases on
company time Avoid actual drug use
Answer: A
Question: 214
One of the following is not prohibited by the Federal Civil Rights Act during an investigation
A. All
B. A record
C. A custodian of record
D. A public official
Answer: A
Question: 215
Who may edit officers incident entries in a database log?
A. CISO, CFO, HR, and Legal
B. Security Officers
C. Higher level supervisors
D. Nobody
Answer: C
Question: 216
How does situational crime prevention differ from CPTED and defensible space?
A. Situational crime prevention seeks to reduce crime opportunities in public and private environments where
applicable
B. Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, not just in the built
environment.
C. Situational crime prevention seeks to reduce crime opportunities through integrating public and private enterprises
D. Situational crime prevention seeks to reduce crime opportunities in all behavioural contexts, in tandem with legal
guidelines and oversight
Answer: B
Question: 217
In what two ways can an undercover operative be placed?
A. Cold Hire (operative applies for a job just like any other applicant) Controlled Hire (the employment process is
covertly manipulated so the operative is hired and appropriately placed)
B. Cold Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is covertly
manipulated so the operative is hired and appropriately placed)
C. Immediate Hire (operative applies for a job just like any other applicant) Direct Hire (the employment process is
covertly manipulated so the operative is hired and appropriately placed)
D. Open Hire (operative applies for a job just like any other applicant) Closed Hire (the employment process is
covertly manipulated so the operative is hired and appropriately placed)
Answer: A
Question: 218
Workplace crime is the function of which three fundamental elements?
A. Quality of hires Environment in which staff is placed Quality of supervision over environment and staff
B. Opportunity, Motive, Ability
C. Opportunity, Motive and quality of personnel
D. Quality of hires Motivation Quality of supervision over environment and staff
Answer: A
Question: 219
Why might lower-level managers more readily accept a bottom-up budget?
A. To allow for future operational increases
B. Because it is a CFO direction
C. Because they had a role in developing it
D. To ensure alignment
Answer: C
Question: 220
What are the three main tools of an investigator?
A. Information Interrogation Instrumentation
B. Information Analysis Instrumentation
C. Information Intelligence Instrumentation
D. Analysis Intelligence Instrumentation
Answer: A
Question: 221
What is the goal of a vulnerability assessment?
A. To identify physical protection system (PPS) components in the functional areas of site security and to gather data
to estimate site performance against particular threats.
B. To identify physical protection system (PPS) components in the functional areas of entry and access and to gather
data to estimate their performance against particular threats.
C. To identify physical protection system (PPS) components in the functional areas of detection, delay and response
and to gather data to estimate their performance against particular threats.
D. To identify physical protection system (PPS) components in the functional areas of emergency management and
business continuity and to gather data to estimate their performance against particular threats.
Answer: C
Question: 222
What is the difference between asset protection and security?
A. Assets protection includes all security functions, as well as related functions such as investigations, legal oversight,
risk management, safety, compliance, and emergency management.
B. Assets protection includes only physical security related functions.
C. Assets protection includes all security functions, as well as related functions such as investigations, risk
management, safety, human resources, compliance, and emergency management.
D. Assets protection includes all security functions, as well as related functions such as investigations, risk
management, safety, compliance, and emergency management.
Answer: D
Question: 223
With respect to span of control, the greater the degree of sophistication of interaction between supervisors and
subordinates, the
A. Broader the optimum span of control
B. More difficult it is to identify the optimum span of control
C. Narrower the optimum span of control
D. More options there are in choosing the optimum span of control
Answer: A
Question: 224
What type of extremists pose the most dangerous threat to the world today?
A. Global jihadists
B. Single ideology extremists
C. Zero day terrorists
D. Independence Extremists
Answer: A

User: Shura*****

Last week, I passed the ASIS-APP exam with the help of the practice tests from Killexams.com. It is an excellent way to get certified since the questions are sourced from the actual pool of exam questions used by the vendor. As a result, almost all the questions I encountered in the exam seemed familiar, and I knew the answers to them. This is a reliable and honest approach, particularly with their money-back guarantee.
User: Pete*****

The products from killexams.com helped me clarify the subjects in a more organized way. I scored an 81% in the authentic exam without much hassle, finishing the asis-app exam in 75 minutes. I also read many captivating books, which served to aid my success in passing the exam. I must admit that my success in the exam was due to the well-prepared material provided by killexams.com, which I was able to grasp easily within two weeks. Thank you very much!
User: Noor*****

I answered all questions in the associate protection professional exam with ease, all thanks to Killexams.com. It is a terrific asset for passing the test, and I advise everyone to use it. I tried several books, but none of them worked for me until I discovered Killexams.com Questions and Answers. The easy-to-understand language and organized questions and answers made it easier for me to plan and prepare for the exam.
User: Verochka*****

I highly recommend killexams.com to others, as I achieved an 89% score with their study guide for the asis-app exam. I was thrilled with the results and felt that my intensive studies were not the only solution to passing exams. After using the killexams.com practice tests to prepare for my asis-app exam, I discovered that I could achieve success in a short period. The study guide helped me to pass the exam, and I was extremely satisfied with my performance.
User: Rurik*****

I am thrilled to have scored 90% on my ASIS-APP exam thanks to Killexams.com online test simulator and study material. I was initially unsure about the accuracy of the material but was pleasantly surprised by how well prepared I felt after taking the test.

Features of iPass4sure ASIS-APP Exam

  • Files: PDF / Test Engine
  • Premium Access
  • Online Test Engine
  • Instant download Access
  • Comprehensive Q&A
  • Success Rate
  • Real Questions
  • Updated Regularly
  • Portable Files
  • Unlimited Download
  • 100% Secured
  • Confidentiality: 100%
  • Success Guarantee: 100%
  • Any Hidden Cost: $0.00
  • Auto Recharge: No
  • Updates Intimation: by Email
  • Technical Support: Free
  • PDF Compatibility: Windows, Android, iOS, Linux
  • Test Engine Compatibility: Mac / Windows / Android / iOS / Linux

Premium PDF with 224 Q&A

Get Full Version

All ASIS Exams

ASIS Exams

Certification and Entry Test Exams

Complete exam list