PSP Practice Test Video Answers

1. B
Minimizing asset vulnerability through risk management is central to PSP objectives.

2. A
Likelihood of occurrence helps prioritize which risks to address first.

3. C
Direct observation provides quantifiable, unbiased data for analysis.

4. B
Learning objectives define the direction and measurable outcomes of the curriculum.

5. B
Defense in depth uses multiple complementary layers of security to prevent breaches.

6. D
Impact evaluations determine whether training led to tangible performance improvements.

7. C
Objectives must be measurable and action-oriented, such as demonstrating a skill.

8. C
Using multiple communication channels increases message retention and accessibility.

9. B
Visible deterrents like patrols and lighting reduce criminal intent effectively.

10. C
Adults value learning that can be applied immediately to their professional duties.

11. C
Post-incident reviews identify lessons to prevent similar future events.

12. B
Guided independence aligns with adult learners’ preference for self-direction.

13. B
Balanced programs integrate physical, technical, and procedural security equally.

14. A
Process evaluation reviews how effectively the training is delivered.

15. C
Adapting messages to the audience enhances understanding and engagement.

16. B
CPTED emphasizes natural surveillance and territorial design to deter crime.

17. B
Benchmarking identifies best practices to improve program effectiveness.

18. B
Root cause analysis finds underlying issues to guide corrective measures.

19. C
Executives prioritize ROI and overall risk reduction in proposals.

20. B
Integrating security early in the design phase ensures compliance and saves cost.

21. B
Audits assess whether existing controls adequately mitigate risks.

22. A
Summative evaluations determine if learning goals were met post-training.

23. B
Self-reflection and assessment encourage ongoing skill development.

24. B
Threat and asset importance dictate the appropriate security design.

25. B
TVA is specifically used to assess threats and vulnerabilities.

26. B
Coaching builds independent decision-making and long-term competence.

27. B
Security design depends on asset value and the threat environment.

28. A
Regular audits ensure ongoing compliance with standards and regulations.

29. B
A decline in incident frequency indicates improved security performance.

30. B
Adults retain information best when applying it immediately to practice.

31. B
Identifying key assets provides focus for all security assessments.

32. B
Redundancy ensures continued protection if one security layer fails.

33. B
Scenario-based testing assesses learners’ ability to apply procedures in practice.

34. B
ROI is effectively measured by comparing reductions in security incidents and costs.

35. B
Assessing asset value and criticality establishes protection priorities in threat assessments.

36. B
Continuous improvement relies on a cycle of review, assessment, and enhancement.

37. C
Effective emergency communication depends on clear, accurate, and timely information.