Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Certified Protection Professional (CPP) Exam

Last Update 17 hours ago Total Questions : 230

The Certified Protection Professional (CPP) Exam content is now fully updated, with all current exam questions added 17 hours ago. Deciding to include ASIS-CPP practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ASIS-CPP exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ASIS-CPP sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Certified Protection Professional (CPP) Exam practice test comfortably within the allotted time.

Question # 41

Which of the following pairs of attacks are described as the theft of login credentials through deception or manipulation in order to install remote access and monitoring software on to a device?

A.

Social engineering and malware

B.

Social engineering and direct hacking

C.

Direct hacking and malware

D.

Malware and web attack

Question # 42

An examination of workplace violence incidents not involving robbery reveals that perpetrators:

A.

usually have no intention of violence, but react to criticism.

B.

suddenly and impulsively " snap. "

C.

progressively move through stages resulting in violence.

D.

have a history of violent behavior.

Question # 43

A business impact analysis provides management information on:

A.

resources that are available on site, who is working in critical positions, the cost of the facility, and testing of the plan of action.

B.

what can happen, what will be affected, and resources that will be needed to reestablish business functions

C.

organized responder notification, incident command structure, testing of the plan of action, and the cost of the facility.

D.

responsibilities of management personnel, the levels of disasters and emergencies, media response techniques, and shelter areas.

Question # 44

While conducting an interview, the most important initial objective for the investigator to accomplish is to:

A.

obtain an understanding of all the facts of the case.

B.

establish a favorable rapport with the interviewee.

C.

use all applicable means to get the interviewee to release information.

D.

prepare copious notes of all events detailed by the interviewee.

Question # 45

Which factor about a risk would make it uninsurable?

A.

Losses would be expected but unintended by the insured.

B.

Losses could not be positively tied to an occurrence in an established amount.

C.

The risk is predictable through the law of large numbers.

D.

The risk would be worth the cost but not the effort to insure.

Question # 46

Which of the following would be most helpful in selling security to management?

A.

Publish security papers to establish credibility, then present a report based on the work.

B.

Prepare in advance and establish a meaningful dialogue with the decision makers.

C.

Know management ' s needs and present a program without bringing in consultants.

D.

Present a generic report and adjust it as management ' s needs are determined.

Question # 47

The key difference between an interview and an interrogation is in the:

A.

number of questions asked.

B.

person being questioned.

C.

seriousness of the matter under investigation.

D.

person asking the questions.

Question # 48

Depositing valuables in an insured safely deposit box at a bank is a good example of risk:

A.

acceptance

B.

delay.

C.

deterrence-

D.

transfer.

Question # 49

A major advantage of outsourcing investigative services is the ability to:

A.

expand or reduce the workforce according to actual needs

B.

maintain closer liaison relations with local agencies and internal contacts

C.

increase the control of investigation quality.

D.

easily manage the contractor.

Question # 50

The two reasons for testing the security operating program are:

A.

identification of residual risks or deficiencies and identification of system changes needed to accommodate organizational changes.

B.

identification of new system requirements and resource justification.

C.

determination of further changes needed in the software and identification of operational problems.

D.

training of personnel and development of new identification procedures as required.

Go to page: