Summer Sale- Special Discount Limited Time 65% Offer - Ends in 0d 00h 00m 00s - Coupon code: netdisc

AACE International PSP Planning & Scheduling Professional (PSP) Exam Exam Practice Test

Page: 1 / 12
Total 120 questions

Planning & Scheduling Professional (PSP) Exam Questions and Answers

Question 1

Those who are delegated authority in the direct chain of command to accomplish specific organizational objectives are known as:

Options:

A.

Management

B.

Authorized directives

C.

Line executives

D.

Stockholders

Question 2

Critical process recovery requires an assessment of resources.

Options:

A.

True

B.

False

Question 3

Document the events, circumstances, and chronology and prepare a “lesson learned” review are the primary parts of:

Options:

A.

Testing

B.

Quality assurance

C.

After action

D.

All of the above

Question 4

_______________ of risk involves planning for an eventual loss without benefit of insurance.

Options:

A.

Planning

B.

Transfer

C.

locking

D.

Self-assumption

Question 5

In which ingredients are added to the loss prevention function one by one as the need arises, without a comprehensive plan, is called:

Options:

A.

Piecemeal security

B.

Small relative security

C.

Detached security

D.

Independent security

Question 6

The system which provides an extra measure of security by requiring that exchanges take place at the entrance to each restricted area within the controlled area is called:

Options:

A.

Single pass system

B.

Contractive pass system

C.

Pass-exchange system

D.

Multiple-pass system

Question 7

Which of eth following is NOT the type of insurance?

Options:

A.

Fidelity Bonds

B.

Surety Bonds

C.

3-D policies

D.

Privacy Invasion

Question 8

What is a feeling of responsibility and respect that develops during an individual’s formative years and is subconscious?

Options:

A.

Moral honesty

B.

Trustworthiness

C.

Integrity

D.

Candor

Question 9

Taking personal property in such a way that the plaintiff’s use or right of possession of chattel is restricted is called:

Options:

A.

Restriction

B.

Transfer

C.

Constraint

D.

Conversion

Question 10

Which of the following is NOT included in the pass systems?

Options:

A.

Single pass system

B.

Multiple pass system

C.

Pass-exchange system

D.

Pass-control system

Question 11

The computers those are capable of great processing speed and data storage, allowing multiple users to utilize the system simultaneously is called:

Options:

A.

Workstations

B.

Main computers

C.

Supercomputers

D.

Mainframes

Question 12

The concept of what requires the mobilization of political, financial and industrial resources for the development and production of modern homeland security and defense?

Options:

A.

International terrorism

B.

Modern terrorism

C.

Modern Revolutionary

D.

Modern War weapons

Question 13

The process of ensuring that the information is not manipulated in an unauthorized way or corrupted, thus diminishing its value and utility to the organization is called:

Options:

A.

Analysis

B.

Integrity

C.

Security

D.

Availability

Question 14

WANs used which protocol developed by the Consultative Committee for International Telephone and Telegraph.

Options:

A.

X.25

B.

XA.10

C.

CXA 1.23

D.

X.20

Question 15

Who developed Ethernet?

Options:

A.

Xeror Corporation

B.

IBM

C.

Microsoft

D.

None of the above

Question 16

Unintentional access to software code is referred to as:

Options:

A.

Bomb

B.

Trapdoor

C.

Backdoor

D.

Trojan Horse

Question 17

What applies to a provider of defective or hazardous products or services that unduly threaten a consumer’s personal safety?

Options:

A.

Strict liability

B.

Plaintiff

C.

Defendant

D.

None of the above

Question 18

When sudden widespread destruction of data both on the computer system and on the peripheral devices occurs, the machine is possibly infected with a:

Options:

A.

Innocuous Bug

B.

Catastrophic Virus

C.

Hostile worm

D.

Trojan Horse

Question 19

Which protocol divides the information into packets, sequentially numbers each packet, and inserts some error control information?

Options:

A.

Transmission Control protocol

B.

File Transfer protocol

C.

Information Control protocol

D.

None of the above

Question 20

A device that sends a signal about whatever is sensed to some other location is called:

Options:

A.

Signal device

B.

Circuit device

C.

Wave device

D.

Line device

Question 21

Which of the following is Correct?

Options:

A.

in 51 percent rule of comparative negligence, the plaintiff’s acts must have contributed less than 50 percent of the situation in order to collect damages.

B.

in 51 percent rule of comparative negligence, the plaintiff’s acts must not have contributed less than 49 percent of the situation in order to collect damages.

C.

in 51 percent rule of comparative negligence, the plaintiff’s acts must not have contributed less than 48 percent of the situation in order to collect damages.

D.

in 51 percent rule of comparative negligence, the plaintiff’s acts must not have contributed less than 51 percent of the situation in order to collect damages.

Question 22

What involves walking or riding a given route to observe the condition of the facility?

Options:

A.

Patrol duty

B.

Posts

C.

Reserves

D.

None of the above

Question 23

Private security functions are not essentially client orientated; public law enforcement functions are society or community oriented.

Options:

A.

True

B.

False

Question 24

In its organizational functions, security encompasses which basic activities with varying degrees of emphasis?

Options:

A.

managerial, detective, preventive, investigative

B.

supervising, administrative, preventive, training

C.

managerial, training, preventive, detective

D.

managerial, administrative, preventive, investigative

Question 25

What is a major management function in business worldwide?

Options:

A.

Security

B.

Projection

C.

Quality

D.

Mission

Question 26

A series of menus from which a person can access virtually any type of textual information is known as:

Options:

A.

Consortium

B.

Hyper-text based tool

C.

Symantec

D.

Gophers

Question 27

A solicitation by police officers is another charge that may be leveled against security officers is called:

Options:

A.

Criminal liability

B.

Wrongful death

C.

Verdict Act

D.

Entrapment

Question 28

_______________ defines the problem, set the requirements, discuss solutions and set out punishment for infractions.

Options:

A.

Physical security

B.

Network Security Policy

C.

Forensic investigations

D.

Spam filtering

Question 29

______________ has been defined as the impact of a loss as measured in dollars.

Options:

A.

Criticality

B.

Loss reserves

C.

Corruptness

D.

Immorality

Question 30

Which liability is of concern to enterprises that contract or employs security services and is an indirect legal responsibility?

Options:

A.

Strict

B.

Negligence

C.

Vicarious

D.

Loose

Question 31

Under 50/50 rule of comparative negligence, the plaintiff can collect for damages if he or she was responsible for more or less than 50 percentage of the negligence.

Options:

A.

True

B.

False

Question 32

What refers to the number of employees over which any individual can exercise direct supervision effectively?

Options:

A.

Corporate period

B.

Delegate control

C.

Span of control

D.

None of the above

Question 33

A good risk management program involves:

Options:

A.

Identify risks or specific vulnerabilities

B.

Analyze and study risks, including likelihood and degree of danger of an event

C.

Study of security programs

D.

All of the above

Question 34

The recommendations of the Task Force on private security include which one of the following?

Options:

A.

a minimum of eight hours of formal pre-assignment training

B.

basic training of a maximum of 32 hours within 2 months of assignment, of which minimum of 16 hours can be supervised on-the-job training.

C.

Both A & B

D.

Neither A nor B

Question 35

Who must regularly study and analyze the channels of communication to be certain that the input they receive is accurate, relevant, timely, concise and informative?

Options:

A.

Chief Information Officer

B.

Information Security Information Officer

C.

Chief Minister

D.

Chief Security Officer

Question 36

Which of the following is NOT the category of signaling systems?

Options:

A.

Global

B.

Auxiliary

C.

Remote station

D.

Central station

Question 37

The dollar loss is not simply the cost of the item lost but also includes:

Options:

A.

Temporary replacement

B.

Downtime

C.

Discounted cash

D.

All of the above

Question 38

Making the most efficient before-the-loss arrangement for an after-the-loss continuation of business is called Risk Management.

Options:

A.

True

B.

False

Question 39

Reserves are the people standing by in the event that assistance is needed by security personnel on fixed posts or patrol; duty.

Options:

A.

True

B.

False

Question 40

A complete contingency planning program has which of the following major elements?

Options:

A.

Emergency response

B.

Crisis management

C.

Business continuity

D.

All of the above

Question 41

When using ____________, computers must ensure that there is no traffic on the network before they are allowed to transmit information.

Options:

A.

File Transfer protocol

B.

Buses

C.

Ethernet protocol

D.

None of the above

Question 42

_____________ is essentially an exhaustive physical examination of a premises and thorough inspection of all operational systems and procedures.

Options:

A.

Program Valuation

B.

Risk analysis

C.

Security survey

D.

Performance audit

Question 43

Which of the following is NOT the distinct action that fall into invasion of privacy?

Options:

A.

misappropriation of the plaintiff’s name or picture for commercial advantage

B.

placing the plaintiff in the false light

C.

private disclosure of public facts

D.

intrusion into the seclusion of another

Question 44

The degree to which a manager or supervisor is able to delegate responsibility rather than trying to do everything personally is a good measure of managerial ability.

Options:

A.

True

B.

False

Question 45

In which approach of comparative negligence, the plaintiff may collect something for injuries even if he or she was primarily responsible for the injuries?

Options:

A.

Pure approach

B.

50/50 rule

C.

51 percent rule

D.

None of the above

Question 46

A good hybrid security operation consists of which component?

Options:

A.

engaged corporate liaison

B.

consistent contract management support

C.

accurate quality measurements

D.

All of the above

Question 47

What focus on legal principles and theories along with cases in which such principles predominate?

Options:

A.

Encyclopedias

B.

Legal document

C.

Formal memorandum

D.

None of the above

Question 48

An event that is possible but uncertain in terms of occurrence or that is likely to happen as an adjunct to other events is called:

Options:

A.

Contingent

B.

Critical processes

C.

Conditional delegation

D.

Emergency response

Question 49

WANs also allow multiple computers to share the same communication line, as is possible with LANs.

Options:

A.

True

B.

False

Question 50

Material Safety Data Sheet (MSDS) that must be available for each chemical at the work site contains which sections?

Options:

A.

Production identification

B.

Hazardous ingredients list

C.

Physical characteristics

D.

All of the above

Question 51

Under the principle of agency law, such an assignment transfers the liability for the service from the corporation to the independent contractor with obligations that some cannot be entirely transferred, is called:

Options:

A.

Non-delegable duty

B.

Delegable duty

C.

Non-Crime duty

D.

None of the above

Question 52

When chief executive officers have authority delegated by the senior executive to whom they report and they are granted a part of authority of their line superior, this is known as:

Options:

A.

Financial authority

B.

Control authority

C.

Staff authority

D.

Dominance authority

Question 53

____________ builds on confusion when two or more people take advantage of their positions and the confusion to steal.

Options:

A.

Conspiracy

B.

Accountability

C.

Invoicing

D.

Proliferation

Question 54

Insurance carriers provide coverage on the basis that the estimated value of loss is always greater than the total of the premiums paid.

Options:

A.

True

B.

False

Page: 1 / 12
Total 120 questions