100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ASIS PSP LATEST 2026 TEST PAPER QUESTIONS AND SOLUTIONS GRADED A.pdf

Rating
-
Sold
-
Pages
23
Grade
A+
Uploaded on
02-01-2026
Written in
2025/2026

ASIS PSP LATEST 2026 TEST PAPER QUESTIONS AND SOLUTIONS GRADED A.pdf

Institution
ASIS PSP
Course
ASIS PSP










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ASIS PSP
Course
ASIS PSP

Document information

Uploaded on
January 2, 2026
Number of pages
23
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ASIS PSP LATEST 2026 TEST PAPER QUESTIONS AND
SOLUTIONS GRADED A+
✔✔The intrusion detection system, in which a pattern of radio waves is transmitted and
partially reflected back to the antenna using the doppler effect is known as -
✔✔Microwave system

✔✔The type of lock generally used on automobiles, desks and cabinets is - ✔✔Wafer

✔✔inventories of keys should be conducted at least - ✔✔annually

✔✔UL classified safes must be anchored to the floor or weight at least - ✔✔750 pds

✔✔The temperatures and humidities at which paper, magnetic strips and floppy discs
may be destroyed are what, which equals the UL Class? - ✔✔350 degrees at 65%
humidity and 150 and 125 degrees for magnetic tapes and floppy discs at 80%
humidity.

✔✔The mechanical lock longest in use which has practically no security value - ✔✔The
warded lock

✔✔The most widely used lock for building doors and rooms - ✔✔Pin tumbler lock

✔✔Foil used as a detector on a glass window to signal a surreptitious or forcible
penetration is - ✔✔Elector mechanical sensor

✔✔Security services in which the security force is hired and controlled directly by the
protected organization are called what? - ✔✔Proprietary.

✔✔What is lost by using a contract security service - ✔✔Control and organization
knowledge.

✔✔The most common perimeter barriers are? - ✔✔Fencing and walls.

✔✔What is designed to control pedestrian traffic and minimize tailgating/piggybacking?
- ✔✔Turnstiles

✔✔What are the 4 key factors in site hardening a facility? - ✔✔1) Stand off distance, the
distance between the asset and nearest point of attack - usually explosion, 2) Structural
integrity, 3) Prevention of progressive collapse, 4) redundancy of operating systems.

,✔✔An adversary may use what 3 types of attacks to defeat an access control point: -
✔✔1) Deceit using false pretenses, 2) Direct physical attack, 3) Technical attack like
forging a badge.

✔✔What are 3 general factors to consider when defining a camera's field of view
requirements? - ✔✔1) Target, 2) activity, 3) purpose

✔✔What are the 4 major types of video surveillance cameras? - ✔✔1) Analog, 2) IP, 3)
Infrared, 4) Thermal.

✔✔A general statement of a principle, approve by senior leaders, according to which an
organization performs business functions is a... - ✔✔Policy.

✔✔Detailed implementation instructions, which may change frequently, for staff to carry
out security policies are... - ✔✔Procedures.

✔✔Presidential directive establishes a policy for a common identification standard for
federal employees and contractors. - ✔✔HSPD-12

✔✔Three parts of the fire triangle - ✔✔Oxygen, heat, fuel

✔✔Theft occurs when what 3 elements are present? The Theft Triangle: - ✔✔1) motive,
2) desire, 3) opportunity

✔✔A barrier is normally considered penetrated when and adversary reaches: - ✔✔3
feet beyond the barrier

✔✔A business impact analysis is conducted during which BCP step? - ✔✔Readiness

✔✔Vulnerability Definition. - ✔✔A weaknesses of an organization that can be exploited
by an adversary that make an asset susceptible to a threat.

✔✔A characteristic that identifies the levels needed to achieve specific objectives under
a given set of conditions - ✔✔A requirement

✔✔Risk analysis is conducted during which PPS life cycle phase? - ✔✔Planning.

✔✔What are 8 major outputs of the Design & Estimation Phase? - ✔✔1) Contract
evaluation criteria, 2) bidder instructions or bid package which packages most of these,
3) system specs, 4) drawings, 5) final SoW, 6) operational procedures. Then for
Estimation, 7) Budget, Prelim, Final and Life Cycle estimates, 8) implementation
schedule.

, ✔✔The job of managing a project involves five basic functions: - ✔✔1) Planning, 2)
organizing, 3) directing, 4) coordinating, 5) controlling.

✔✔A structure that extends higher than the maximum reach of available fire fighting
equipment, generally 75-100 feet. - ✔✔High rise

✔✔What are the 3 operating modes of a high rise building? - ✔✔1) Open, 2) Closed, 3)
Hybrid.

✔✔Point Security Definition. - ✔✔Outer perimeter is loosely controlled with focus on
individual buildings.

✔✔Area Security Definition. - ✔✔Perimeter and entry portals, usually only one, have
higher control and security features.

✔✔Name 5 methods to Address Risk. - ✔✔1) Acceptance/Assumption 2) Avoidance 3)
Spreading/Limitation 4) Transfer 5) Reduction/Site Hardening.

✔✔What are the 6 general steps of Risk Assessment approach regardless of the model.
- ✔✔Value of assets, then threats, then vulnerabilities, then impact, then analysis which
may include prioritization, costs, and probability, then mitigation. This is a cyclical
process.

✔✔What are 3 types of Assets. - ✔✔1) Tangible 2) Intangible 3) Mixed

✔✔Name 3 ways to value an asset. - ✔✔1) Relative Value, low-high, 2) Total Cost of
Loss, K, equals Cp, permanent replacement cost + Ct, temporary replacement cost +
Cr, related costs like removal or installation + Ci, lost income -I, insurance, 3) Security
Risk Rating equals Asset Value x Threat Likelihood x Severity or impact x Vulnerability.

✔✔Hazard definition - ✔✔A condition that makes it more likely a peril will occur - for
example, mental illness. It is sometimes associated with nature.

✔✔Name 3 types of threats. - ✔✔1) Intentional or criminal, 2) natural or noncriminal 3)
inadvertent or consequential like strikes which includes peripheral threats.

✔✔What are two ways to measure vulnerability. - ✔✔1) Observability - adversary can
see the vulnerability 2) Exploitability - adversary can take advantage of vulnerability.

✔✔Impact is usually measured in what terms? - ✔✔Financial.

✔✔Evaluation levels for threat, vulnerability, and impact should be decided by who? -
✔✔Multi-disciplinary Team

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BOARDWALK Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
177
Member since
1 year
Number of followers
6
Documents
24136
Last sold
3 days ago
BOARDWALK ACADEMY

Ace Your Exams With Top Quality study Notes And Paper✅✅ ALL ACADEMIC MATERIALS AVAILABLE WITH US✅✅ LEAVE A REVIEW SO THAT WE CAN LOOK AND IMPROVE OUR MATERIALS.✅✅ WE ARE ALWAYS ONLINE AND AVAILABLE DONT HESITATE TO CONTACT US FOR SYUDY GUIDES!!✅✅ EVERYTHING IS GRADED A+✅✅ COLOUR YOUR GRADES WITH US , WE ARE HERE TO HELP YOU DONT BE RELACTANT TO REACH US

3.7

33 reviews

5
14
4
6
3
7
2
0
1
6

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions