ASIS ASIS-CPP Übungsprüfungen
Zuletzt aktualisiert am 26.04.2025- Prüfungscode: ASIS-CPP
- Prüfungsname: Certified Protection Professional
- Zertifizierungsanbieter: ASIS
- Zuletzt aktualisiert am: 26.04.2025
Post orders should be developed with which of the following criteria in mind?
- A . Each order is indexed
- B . Each order is detailed
- C . Each order is written in third party language
- D . Each order deals with one subject
A cost-benefit analysis is essential to:
- A . balance the security budget.
- B . select the proper risk treatment.
- C . predict long-Term financial concerns.
- D . select the most affordable security solution.
When preparing risk analysis reports, criticality is defined as the:
- A . impact of a loss as measured in dollars.
- B . possibility of a loss event occurring.
- C . need to decrease emergency response time.
- D . risks that can be assumed or transferred.
With special provisions and approvals from the authority having jurisdiction, it is acceptable for "delayed exit" devices to have which of the following maximum ranges of locking time?
- A . 1-5 seconds
- B . 5-15 seconds
- C . 15-30 seconds
- D . 30-45 seconds
Cost avoidance can best be described as the:
- A . amount of losses that likely would have occurred without the security program.
- B . cost of the loss-prevention program.
- C . amount of losses that likely would have occurred without a disaster recovery plan.
- D . savings achieved through outsourcing.
An organization’s long-term ambition is called its:
- A . focus.
- B . vision.
- C . mission.
- D . objective.
Senior management establishes guidelines for acceptable expenditures and then allocates a specific amount of money to a security department.
This type of budget process is called:
- A . zero based
- B . bottom line
- C . lop down.
- D . bottom up.
Choosing a security container for a specific software application is largely determined by value and what other characteristic of the item to be stored?
- A . Vulnerability
- B . Commonality
- C . Place of origin
- D . Reproducibility
Protection-in-depth is the strategy of:
- A . forming layers of protection around an asset.
- B . creating barriers that deter, detect, and delay access to an asset
- C . assigning security precautions to all assets.
- D . applying security precautions based on value.
A code of ethics contains all of the following EXCEPT a:
- A . statement from the chief executive describing and supporting the purpose and importance of the code.
- B . statement of the organization’s specific nature of business
- C . statement of the commitment to the code.
- D . statement of the human resources department.