100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CERTIFIED PROTECTION PROFESSIONAL STUDY GUIDE QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
03-08-2025
Written in
2025/2026

CERTIFIED PROTECTION PROFESSIONAL STUDY GUIDE QUESTIONS AND ANSWERS

Institution
CPP
Course
CPP









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CPP
Course
CPP

Document information

Uploaded on
August 3, 2025
Number of pages
5
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CERTIFIED PROTECTION
PROFESSIONAL STUDY GUIDE
QUESTIONS AND ANSWERS
"Span of Control" is a management term which refers to the - ANSWER-number of
personnel over which one can effectively supervise

"Chain of Command" is a management term which refers to the - ANSWER-path
along which authority flows

"Unity of Command" is a management concept which means that an employee -
ANSWER-should have only one immediate supervisor to whom the employee should
report.

The Theory X management theory holds that the average employee has - ANSWER-
little ambition, dislikes work and must be coerced, controlled and directed to achieve
organizational objectives.

The Theory Y management theory holds that the average employee - ANSWER-
does not dislike work, is self directed, is creative and imaginative, accepts
responsibility and is committed to achieving the organizational needs and objectives

The Theory X and Theory Y managements concepts were developed by - ANSWER-
Douglas McGregor

The concept of Management by Objectives or MOB is an approach where -
ANSWER-both subordinates and superiors agree on measurable goals to be
achieved primarily by the subordinate over a stated period of time.

Risk Analysis is a management method used to minimize risks through - ANSWER-
the application of security measures commensurate with the threats.

Eighty percent (80%) of computer security incidents result from - ANSWER-insider
attacks by dishonest and disgruntled employees

The five principal crime risk management methods are - ANSWER-Avoidance,
Reduction, Spreading, Transferring and Acceptance

The theft triangle consist of the following components - ANSWER-motivation,
opportunity and rationalization (desire)

Pilferage is defined as stealing in small quantities - ANSWER-over a long or
prolonged period of time.

, Upon the discovery of a suspicious object or package a clear zone with a radius of at
least, - ANSWER-300 feet should be established including the floors above and
below.

For the most effective personal protection of a possible kidnapping target, a
minimum of - ANSWER-two (2) bodyguards is recommended

The purpose of a fire door is to - ANSWER-impede the spread of the fire.

The responsibility for the shut down of machines in the plant or facility as a result of
a disaster should be assigned to - ANSWER-the persons familiar with the shut down
process

The greatest single destroyer of property is - ANSWER-fire.

In the event the Media makes contact as a result of a crisis situation, they should be
- ANSWER-put in contact with the person designated in the emergency plan for
orderly release of information from the facility.

The ionizing fire detector warns of fire by responding to - ANSWER-invisible
products of combustion emitted by a fire at its earliest stage, the incipient stage

The fire detector which responds to a predetermined temperature or to an increase
in temperature is known as - ANSWER-a Thermal detector

The fire detector which responds to changes or interruption in the light source is
know as - ANSWER-a photoelectric smoke detector.

After a bomb threat is made, if a suspicious object is found during searches, the item
should be - ANSWER-reported to the relevant responding local agencies and the
Designated Authority

The removal of any suspicious object or suspected bomb should be done by -
ANSWER-professional bomb disposal personnel

The taking of property entrusted to someone's care is known as - ANSWER-
Embezzlement

Many experts agree that the most important deterrent to internal theft is - ANSWER-
the fear of discovery

According to estimates theft by employees causes or accounts for about - ANSWER-
1/3 of all business failures

Proprietary information is information of value owned by or entrusted to a company
which relates to - ANSWER-the operations of the company and which has not been
disclosed publicly.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
biggdreamer Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
250
Member since
2 year
Number of followers
68
Documents
18071
Last sold
1 week ago

4.0

38 reviews

5
22
4
4
3
6
2
2
1
4

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions