ANSI / ASIS PAP.1-2012 Physical Asset
Protection ASIS APP Exam
What does PAP stand for? - ✔✔Physical Asset Protection
What type of approach is PAP? - ✔✔Multi process iterative approach
What does PPS stand for? - ✔✔Ph
...
ANSI / ASIS PAP.1-2012 Physical Asset
Protection ASIS APP Exam
What does PAP stand for? - ✔✔Physical Asset Protection
What type of approach is PAP? - ✔✔Multi process iterative approach
What does PPS stand for? - ✔✔Physical Protection Systems
what does PAPMS stand for? - ✔✔physical asset protection management system. 0.1
In order to effectively protect its assets, an organization needs to? - ✔✔recognize the
inter-dependencies of various business functions and processes to develop a holistic
approach to PAP. 0.1
in order to understand the shared risk environment, the organization should consider?
Four things - ✔✔1. a common basis for risk ownership and accountability:
2. An integrated risk assessment and harmonized treatment strategy:
3. Common lines of communication and reporting for assessing and managing risk:
4. Establishing cross disciplinary and cross functional teams
what does "PDCA" stand for? - ✔✔Plan, do, check, act. 0.2
PAP management is not always based on predictable threats and quantifiable risks.
True or false - ✔✔true. 4.6
the PAPMS includes the protection of both? - ✔✔tangible and intangible assets. 1
The goal of PAPMS is the protection of assets by? - ✔✔removing or reducing the
exposure of assets to threats and haphazards by developing appropriate protective
measures. 4
The PPS should integrate____________, __________ , and _______________ for the
protection of the organization's assets, its properties, facilities, and operations. -
✔✔People, procedures, and equipment. A .7 .3
The functions of PPS are to? - ✔✔Deter the occurrence of an event,
Delay adversaries from reaching their target,
Detecting undesirable event or attack,
Provide a response to deny adversaries from reaching their target. A.7.3
Physical asset protection requires an organization to protect its assets and interests
from? - ✔✔Malevolent acts,
Undesirable events and changes,
Natural, social, and economic environment,
The community in which it and its interests operate. B.1
Factors that will influence the adversary's perception of the target fall into a
phenomenon referred to by the acronym? - ✔✔Craved. B .1
What does the acronym "CRAVED" stand for? - ✔✔Concealable:
Removable:
Available:
Valuable:
Enjoyable: and
Disposable. B .1
The security survey, as part of the risk assessment, is an examination and evaluation of
a facility and its_____________, _______________ and __________________? -
✔✔policies, procedures, and operations. B .1 .2
What is the primary vehicle used in the overall assessment program for the PAPMS? -
✔✔the security survey. B .1 .2
What is security convergence? - ✔✔The managed process that applies the principles of
security risk management to the convergence of individual PAP systems and their
integration into an organization's enterprise security system and enterprise risk
management processes. B .1 .4
Security systems should not be integrated into an organization's computer network
unless the organization can? - ✔✔Clearly secure the systems both physically and
technically, intentional or unintentional compromise. B .1 .4
What does the acronym CPTED stand for? - ✔✔crime prevention through
environmental design. B .1 .5
What is the definition for CPTED? - ✔✔A strategic approach to reducing the risks of
malevolent acts and other disruptive events by combining the natural features of the
site, build environment, and the human behaviors associated with the location. B .1 .5
What approach does CPTED use to reduce the likelihood of a threat materializing
and/or mitigating its consequences? Three items - ✔✔organizational,
Mechanical,
Natural methods. B .1 .5
CPTED solutions are integrated into ______________and _____________ of facilities?
- ✔✔Design and functions. B .1 .5
The CPTED approach seeks to diminish the adversaries motivation by? - ✔✔Reducing
his/her confidence of success and lessening the desire to act maliciously. Be .1 .5
the CPTED approach changes the attributes of __________, thereby altering the
adversary's perception of the assets - ✔✔Space. B.1.5
What are the three general categories of CPTED approaches? - ✔✔Mechanical
measures,
Organizational measures,
Natural and/or architectural measures. B .1 .5
Security lighting provides the elements of ______and _____. - ✔✔Deterrence and
Detection. B .2
Lighting should not be used solely as a _________________ deterrent. -
✔✔Psychological. B .2 .2
Lighting should be used in conjunction with _______________ systems deployed to
protect assets? - ✔✔barrier. B .2 .2
A barrier system is any type of obstacle provided that causes ____________
_________ _________ ___________ ____________? - ✔✔Direct impact on the speed,
time, and tools necessary to circumvent the obstacle. B .3 .1
Intrusion detection is defined as the? - ✔✔Detection of a person or vehicle attempting to
gain unauthorized entry. B.4
Intrusion detection systems consist of? four items - ✔✔operators,
Monitoring devices,
Sensors,
Support equipment. B .4
Intrusion detection sensors perform four functions of detection? - ✔✔intruder
penetration,
Intrusion motion detection,
Operator violation,
The movement of protected property within the space. B.4
Technical components of intrusion detection systems are comprised of three elements?
- ✔✔An alarm sensor,
A circuit or sending device,
In annunciator or sounding device. B .4
The objectives of entry and access control are met by achieving three fundamental
concepts? - ✔✔Something a person has, a key or credential,
Something the person knows, identification number,
What is inherent to a person, biometric ID.
B.5 .1
The common performance measurements of entry and access control systems are?
Two items - ✔✔Throughput, the measure of time,
False readings in the measure of acceptance. B .5 .2
Video surveillance cameras are installe
[Show More]