Lea - Industrial Security Management W Ans
Lea - Industrial Security Management W Ans
COMPILATION ON
PREPARED BY:
KENRUSS B. CALION
APOLLO M. CAYSIDO JR.
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
INSTRUCTION: Select the correct answer for each of the following questions. Mark only one
answer for each item by marking the box corresponding to the letter of your choice on the answer
sheet provided. STRICTLY NO ERASURES ALLOWED. Use pencil no. 1 only.
1. The badge or pass coded for authorization to enter specific areas is issued to an em-
ployee who keeps it in his possession until his authorization is terminates.
2. An exchange takes place at the entrance of each controlled area. Upon leaving the per-
sonnel surrender his badge or pass and retrieve back his basic identification.
3. This provides an extra measure of security by requiring that an exchange take place at
the entrance of each restricted area.
4. All visitors to any facility should be required to identify themselves and should be given a
visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors,
nature and duration of visit.
5. if a visitor has camera and it is prohibited to take picture, said camera should be left in
the care of security with corresponding receipt.
a. Escort c. Pass Exchange System
6. If possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.
7. Separate access for visitors and employees of the establishment should be provided.
a. Visitor entrances c. Pass Exchange System
8. If there is a long delay or time lapse between the departure and arrival, the visitors may
be required to show cause of the delay.
a. Photograph c. Pass Exchange System
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
9. Refers to those practices, technologies and/or services used to ensure that personnel se-
curity safeguards are applied.
10. This is as important as physical security personnel, security starts even before the hiring
of an employee and remains to be maintained for as long as the person is employed.
a. Personal security c. Auditable process
11. Refers to specific documentation which can be a manual or an automated process that
provides sufficient that will allow one to trace the events of an action that has taken place.
a. Personnel Security c. Auditable process
12. Refers to critical information for which the unauthorized access, loss, misuse, modifica-
tion, or improper disclosure could negatively impact the ability of the entity or agency to
provide services and benefits to its customers.
13. Refers to information that involves the privacy to which individuals are entitled by law.
a. Personnel Security c. Sensitive Data/Information
14. A process of inquiry into the character, reputation, discretion, integrity, morals and loyalty
of an individual to determine the suitability for appointment or access to classified matter.
15. This technique is very expensive but necessary in personnel security. It serves to verify
information on the application form and to obtain other information pertinent to the deci-
sion to employ.
16. Is a BI activity where the sources of information involve only the local agencies in the
community such as the local government units?
17. Like the local agency check, NAC is also a BI activity but the source of information in-
volves the national government units.
18. Is the process of inspecting of examining with careful thoroughness? The essence of
vetting that it is a personal; interview conducted under stress. It is based on information
previously given by the applicant. Other information sued during the interview, such as
those discovered in the BI. This affirms or denies this given by the applicant.
a. Positive Vetting c. Personnel Security
19. Is the process whereby a subject’s reaction in a failure critical situation is predicted by ob-
serving his behavior, or by interviewing him, or analyzing his responses to a question-
naire, such as an honesty test?
20. This is a process of using devices in detecting deception during the interview stage.
a. Financial and Lifestyle Inquiry c. Positive Vetting
21. This type of investigation seeks to gather information on income and mode of living,
sometimes referred to as the earning-to-debt-ration.
a. Deception Detection Techniques c. Positive Vetting
22. This is the placement of an agent in a role in which the agent’s true identity and role
remains unknown in order to obtain information for criminal prosecution or for recovery or
limitation of asset losses.
a. Deception Detection Techniques c. Positive Vetting
23. This is a valuable tool because it gives departing employees an opportunity to list
grievances. It offers managers an opportunity to learn of problems not previously known.
25. it is the first contact of the prospective employee wherein the interviewer determine the
suitability of the applicant for employment through his give answers on the different type
of questions is being conducted.
a. Interview c. Initial Interview
26. It is in this stage where new employees received detailed presentation of personnel
security policy. Usually handouts or employees manual are being distributed for
reference.
a. Interview c. Initial Interview
27. It is design to remind employees of the company about their responsibilities, review the
guidelines and policies, introduction of new policies and regulations and a moment of
getting employees feedback about the company policies that is being implemented.
28. A phase which employs an indirect approach of educating the employees such as posting
security posters and distributing fliers.
a. Security Reminders c. Initial Interview
29. It is the act of emphasizing the importance and role of security achieving the company
goals and objectives. It involves securing employee cooperation and support.
30. It is the protection of records from its entire document life cycle. It also connotes in this
context the safeguarding classifieds matters. This involves the protection of documents
and classified papers from loss, access by unauthorized persons, damage, theft and
compromise through disclosure.
a. Document Security c. Document Promotion
31. Is the aspect of security which involves the application of security measures for the
proper protection and safeguarding of classified information.
a. Document Privacy c. Document Promotion
32. These are information and material (matter), the unauthorized disclosure of which would
cause exceptionally grave damage to the nation, politically, economically of from a secu-
rity aspect.
a. Secret Matters c. Super Secret matters
34. These information and material (matter), the unauthorized disclosure of which, while not
endangering the national security, would be prejudicial to the interest or prestige of the
nation or any government activity, or would cause administrative embarrassment or un-
warranted injury to an individual or would be of advantage to a foreign nation.
a. Secret Matters c. Restricted Matters
35. These are information and materials (matter), which requires special protection other
than that determined to be top secret, secret, and confidential.
a. Secret Matters c. Restricted Matters
36. What is the color code use for a TOP SECRET INFORMATION?
a. Green color code c. white color code
40. Means protecting information and information systems from unauthorized access, use,
disclosure, disruption. Modification or Destruction.
a. Information Security c. Information keeping
41. It is information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership
a. Top Secret Information c. Information
42. This consists of any formula, pattern, device or compilation of information which is used
in one’s business and which gives him an opportunity to gain the advantage over com-
petitors who do not know or use it. It may be a formula for chemical compound a process
of manufacturing, treating or preserving materials, a pattern for machine or device or list
of customers.
43. This is a grant made by the government to inventor, conveying or securing to him the ex-
clusive right to make, use or sell his invention for term years.
a. Trade Secret c. Government Secret
44. Is a requisite for maintaining the privacy of the people whose personal information the or-
ganization holds.
a. Confidentially c. Integrity
b. Secrecy d. Availability
45. In information security, integrity means that data cannot be created, changed or deleted
without authorization.
a. Confidentially c. Integrity
b. Secrecy d. Availability
46. The concept of availability means that the information, the computing systems used to
process the information, and the security controls used to protect the information is all
available and functioning correctly when the information is needed. The opposite of avail-
ability is denial of service.
a. Confidentially c. Integrity
b. Secrecy d. Availability
48. Use software and data to monitor and control access to information and computing
systems.
a. Physical Control c. Control of responsibilities
49. Monitor and control the environment of the work place and computing facilities. They also
monitor and control access to and from such facilities.
a. Physical Control c. Administrative Control
50. Information security uses cryptography to transform usable information into a form that
renders it unusable by anyone other than an authorized user; this process is called
__________.
a. Encryption c. Cryptography
a. Cyphers c. Cryptography
52. This provides information security with other useful applications as well as including im-
proved authentication methods, message digests, digital signatures, non-repudiation and
encrypted network communications.
a. Cyphers c. Cryptography
54. This is important to make security personnel conscious and realize the value of docu-
ment. This is also necessary for the practice “Need to Know” principle
a. Trainings c. Practice
b. Drills d. A & C
55. Is defined as a critical on-site examination and analysis of an industrial plant. Business, a
home or public or private institution done to ascertain the facility’s current security status,
to identify deficiencies or excess in current practices, to determine what protection is
needed and to make recommendations for improving the overall level of security at that
installation.
a. Security Survey c. Practice
56. Is conducted for two reasons: to check on the degree of compliance with the
recommended countermeasures and to determine the effectiveness and adequacy of the
countermeasures which are in effect.
a. Security Survey c. Security Investigation
57. Is a planned and organized determination of facts concerning specific loss or damage of
assets due to threats, hazards or unsecured conditions.
a. Security Survey c. Security Investigation
58. Acts or conditions which result in a situation conducive to a breach of the protection
system and the subsequent loss or compromise of defense information, secrets or
damage to personnel, property or facilitates.
a. Security Survey c. Security Investigation
59. One who steals due to his inability to resist the unexpected opportunity and has little fear
of detection.
60. Steals with pre-conceived plans and takes away any or all types of suppliers or items for
economic gain.
a. Casual Pilferer c. Pilferer
61. Is called a private security guard or watchman that include and person who offers or ren-
ders personal service to watch or secure either a residence or business establishment or
both for hire or compensation and with license to exercise profession
b. Security d. Personnel
62. It is a group of selected men, trained or grouped into functional unit for the purpose of
protecting operational process from those disruptions at a particular plant, facility, instal-
lation or special activity.
64. A security force maintained and operated any private company for its own security re-
quirements only.
65. A security unit maintained and operated by any government entity other than military and
police which is established and maintained for the purpose of securing the office or com-
pound and extension such government entity.
a. RA 6975 c. RA 9165
67. As used herein shall refer to the current PNP Civil Security Group Agency and Guard
Supervision Division or any other PNP office that may be designated later as the primary
office for supervision of the implementation of these rules and regulations.
a. SAGSD c. PADPAO
b. PNP [Link]
69. The one who are authorized to issue the implementing rules and regulations pertaining to
R.A. NO.548
a. SAGSD c. PADPAO
b. PNP [Link]
70. Any Filipino Citizen or corporation association, partnership, one hundred percent (100%)
of which is owned and controlled by Filipino Citizen. Can organize security guard, watch-
men, or detective agency.
a. TRUE c. MAYBE
a. Not less than 25 years old of age c. Not less than 22 years old of age
b. Not more than 25 years old of age [Link] less than 20 years old of age
72. How much is the minimum capitalization to start business like security guard, watchmen,
or detective agency.
a. Minimum capitalization of two million (2,000,000) with minimum bank deposit of five
hundred thousand (500,000) pesos in order to start its business.
b. Minimum capitalization of one million (1,000,000) with minimum bank deposit of
five hundred thousand (500,000) pesos in order to start its business.
c. Minimum capitalization of five hundred thousand (500,000) with minimum bank deposit
of one hundred thousand (100,000) pesos in order to start its business.
d. Minimum capitalization of five million (5,000,000) with minimum bank deposit of one
million (1,000,000) pesos in order to start its business.
a. Yes c. MAYBE
74. What is the age qualification for new applicant and SG’s in supervisory position?
75. No regular license shall be granted to any private security agency unless it has minimum
of _____?
76. No regular license shall be granted to any company guards’ force or private detective
agency unless it has minimum of _____?
a. (10) licensed private security personnel under its employ
b. (50) licensed private security personnel under its employ
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
77. What is the maximum number of private security personnel that a PSA/CGF/PDA may
employ?
78. How many years is the validity of the License to Operate of a security agency?
a. 1 year c. 3 years
b. 2 years d. 5 years
79. A temporary license is issued by the ________ THRU civil Security Group Directorate af-
ter the applicant/licenses should have complied with all the requirements while it has less
than two hundred guards?
a. SAGSD c. PADPAO
b. PNP [Link]
80. A _______ to operate is issued to the PSA once it is qualified of having two hundred
(200) or more license security guard in its employ duly posted.
b. 2 years d. 5 years
82. The use of expired license is not allowed. In case of doubt, licenses may be verified at
_______ whether valid or fake.
b. DOJ [Link]
83. Firearm’s license-all firearms of the security agency should be covered with firearms li-
cense issued by the PNP through its ____________.
84. Firearm’s license-all firearms of the security agency is renewable every _______. No du-
plication of two or more firearms with the same make and serial number shall be covered
by one license.
a. 1 year c. 3 years
b. 2 years d. 5 years
a. Hiring c. Training
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
b. Promotion d. Practice
a. 48 hrs. c. 12 hrs.
b. 72 hrs. d. 24 hrs.
a. 72 hrs. c. 48 hrs.
b. 12 hrs. d. 24 hrs.
89. How many hours is the duration of Security Officer Training Course?
92. The total number of high powered firearms that an agency or security force/unit is autho-
rized to possess shall not exceed ______?
a. 20 % c. 10 %
b. 15 % d. 30 %
93. Is a written instructions issued by the agency to its guards to perform lawful activity at
specific time, place and date.
94. Who established the first national private security and investigation company in the
United States?
97. He introduced the first armored carriage for the transportation of money and valuables.
98. He invented, introduced the modern combination lock. Bankers quickly adopted Yale’s
lock for their safes.
99. The first city in United States to install video cameras along its main business street in an
effort to fight crime.
100. Is a branch of information security applied to both theoretical and actual computer sys-
tem. A branch of computer science that addresses enforcement of secure behavior on
the operation of computer.
INSTRUCTION: Select the correct answer for each of the following questions. Mark only one
answer for each item by marking the box corresponding to the letter of your choice on the answer
sheet provided. STRICTLY NO ERASURES ALLOWED. Use pencil no. 1 only.
1. Is the means of ensuring that data is kept safe from the corruption and that access to it is
suitably controlled.
3. Means protecting information and information system from unauthorized access, use,
disclosure, disruption, modification, or destruction.
5. Describes measures that prevent or deter attackers from accessing a facility, resources, or
information, stored on Physical media.
6. A type of security which is concern with the protection of the stores, ware houses, storage,
its immediate premises and properties as well as supermarket personnel and customers.
7. Refers to the techniques and methods used in protecting airports and by extension aircraft
from crime and terrorism.
8. Are those methods use of protecting residential homes or town site which includes the
interior protection of houses against property losses or damages.
9. This was a body of Rural Police organized in each town and establishment by Royal
Decree of January 8, 1836.
11. . Unit that shall perform all police functions over Philippine territorial waters and rivers
including ports of entry and exit.
a. Police Intelligence c. Police Security
b .Maritime Command/Police d. Special Action
Command/Force
12. Serves as a mobile strike force or reaction unit to augment regional, provincial, municipal and
city police forces
a. Special Action Command/Force c .Aviation Security
Command/Force
u. Maritime Command/Police d. Medical and Dental Service
13. Headed by a Director with a rank of Chief Superintendent which shall provide scientific and
technical investigate aid and support to the PNP and other government investigate agencies.
a. Administrative Support Unit c. Crime Laboratory
c. PNP national offices d. Logistic Support Service
14. Unit shall serve as the intelligence and counter intelligence operating unit of the PNP
a. Police Security c. Special Action Command
b. Police Intelligence d. Police Community Relarions
15. Type “A” for the cities with population ranging from ________ and above;
a.150, 000 c.75, 000
b. 50,000 d.100, 000
16. Type: A: for the municipalities with population ranging from _____ and more;
a.75, 000 c.60, 000
b.85, 000 d.50, 000
17. Appointed by the President among the Senior Officers down to the rank of Chief
Superintendent in Service.
a. Police Inspector c. Police Director General
b. Police Senior Superintendent d. Police Deputy Director
General
18. Awarded to any member of the PNP, a deed of personal bravery and self sacrifice.
a. Medalyang Kabayanihan [Link] Katapatang Paglilingkod
b. Medalyang Katapangan [Link] Kagitingan
19. Awarded to any member of the PNP for gallantry in action not warranting the award of
medalyangkagitingan.
a. MedalyangKatapangan [Link]
[Link] d..MedalyangKagitingan
20. Refers to any offense committed by a PNP member affecting order and discipline within the
police organization
a. Exclusive Jurisdiction c. Breach on Internal Discipline
b. Memorandum Circular no. 2007-001 d. Citizen’s Complaint
21. A complaint or charge filed against a PNP member shall be heard and decided exclusively by
the disciplining authority that has acquired original jurisdiction.
[Link] Circular no. 2007-001 [Link]’s Complaint
[Link] Jurisdiction d. Breach on Internal
Discipline
22. One of the disciplinary tool of the PNP that hear and decide citizen’s complaints or cases filed
before it against erring officers of the PNP.
a. PLEB c. NAB
[Link] [Link]
24. Is the process of dividing work to be done and coordinating results to achieve desired purpose
a. Organizing c. Leading
b. Planning d. Controlling
25. Are designed to meet the long-range, overall goals of the organization.
a. Operational Plans c. Strategic Plans
b. Standing plans d. Time specific Plans
26. Procedures intended to be used in all situations of all kinds shall be outlined as a guide to
officers and men in field
a. Headquarters Procedure c. Special Operating Procedure
b. Field Procedures d. Procedural Plan
27. Production of intelligence essential to prevention of crimes and the investigation, arrest and
prosecution of criminal offenders
a. Counter Intelligence c .Criminal Intelligence
b. Public Safety Intelligence d. Internal Security Intelligence
28. King of Intelligence covers the activity devoted in destroying the effectiveness of hostile foreign
activities and to protection of info against espionage, subversion and sabotage
a. Counter Intelligence c. Line Intelligence
b. Strategic Intelligence [Link] Safety Intelligence
29. Awarded to members of the PNP for demonstrated exemplary efficiency, devotion and loyalty to
their duty assignments.
a. MedalyangKasanayan c. MedalyangPapuri
[Link] d. MedalyangMabutingasal
30. It is the concern of DILG to provide this assistance for its personnel
a. Health and Welfare c. Retirement Benefit
b. Longevity pays and allowance d.. Permanent Physical Disability
31. This was created by a Royal Decree, to partially relieve the Spanish Peninsular Troops of their
work in policing towns.
a. Philippine Republic c. The Guardia Civil
b. The Guardrilleros [Link] de SeguridadPublic
32. Embodying the Peace and Order Special account made the payment of Police Salary subsides
which was a morale booster to the underpaid law enforces
a. R.A no. 6134 c. R.A no. 1623
b. R.A no. 6111 d.R.A no 1756
33. Awarded to PNP members and civilian personnel of the Republic of the Philippines and of
friendly foreign nations for distinguished or extraordinary achievement or service in the
advancement of science, socio-economic to public service of the highest order
a. Medalya ng katangitanging gawa c. Medalya ng Kadakilaan
b. Medalya ng Kasanayan [Link] ng Papuri
34. The heads of the regional offices with the rank of Chief Superintendent shall assume the
position title of _______?
a. Deputy Provincial Director c. Regional Director
b. District Director d. Deputy District Director
35. The manning levels of the PNP shall be approximately in accordance with a police to population
ratio of one policeman for every ____?
a. 400 person c.100 persons
b. 500 person d.300 persons
37. To review an appealed case wherein the penalty imposed by the adjudication Board is removal
or dismissal from the service within 15 days.
a. Special appellate Committee c. Integrated National Police
b. General Supervision d. Personnel Development Standards
38. This is important to make security personnel conscious and realize the value of document.
This is also necessary for the practice “Need to Know” principle
a. Trainings c. Practice
b. Drills d. A & C
[Link] is the first contact of the prospective employee wherein the interviewer determine the
suitability of the applicant for employment through his give answers on the different type of
questions is being conducted.
a. Interview c. Initial Interview
40. Enacted to promote career development in police service by establishing uniform INP
personnel development standards.
a. General Supervision over INP Units c. Personnel Development Standards
b. Integrated National Police d. Operational Supervision
41. Type of lock that can be opened by pressing a series of numbered buttons in proper
sequence
a. Padlock c. Code operated lock
b. Combination lock d. Electrical lock
42. Type of lock that can be opened and closed remotely
a. Padlock c. Code operated lock
b. Combination lock d. Electrical lock
43. Detachable lock having a sliding hasp which passes through a staple ring
a. Padlock c. Code operated lock
b. Combination lock d. Electrical lock
44. Separate access for visitors and employees of the establishment should be provided.
a. Visitor entrances c. Pass Exchange System
45. The first city in United States to install video cameras along its main business street in an
effort to fight crime.
a .Olean, New York c. Las Vegas Nevada
b. Sta. Monica, California d. Los Angeles California
47. These are information and material (matter), the unauthorized disclosure of which would
cause exceptionally grave damage to the nation, politically, economically of from a security
aspect.
a. Secret Matters c. Super-Secret matters
48. The one who are authorized to issue the implementing rules and regulations pertaining to
R.A. NO.548
a. SAGSD c. PADPAO
b. PNP d. DILG
49. What is the color code use for a RESTRICTED INFORMATION?
a. Green color code c. white color code
to determined person suitability for appointment or access to classified matters is known as:
a. PSI c. LAC
b. NAC d. BI
65. In industrial security, when access is limited only to authorized personnel, the area is referred
to as:
a. Restricted Area c. Visitors Area
b. Safe Area d. Detour Area
66. The Exterior and interior parallel area near the perimeter barrier of an industrial compound to
afford better observation and patrol movement is known as:
a. Protective Zone c. Clear Zone
b. Twilight Zone d. Patrol lane zone
67. A new private security agency shall be issued a temporary license to operate good for how
long?
a. 1 yr. c. 2 yrs.
b. 3 yrs. d. 6 months
68. A private Security and private detective agency may organized by any Filipino citizen or
corporation, association, partnership which how many percent owned and controlled by a Filipino
Citizen.
a. 70% c. 80%
b. 90% d. 100%
69. This is a place in an industrial where a security agency will establish its personnel
identification and checking system.
a. Control Point c. Detachment Headquarters
b. Guard House d. Branch Office
70. This is known as the weakest link in the security chain.
a. Information Security c. Personnel
b. Physical Security d. Documentary Security
71. The tenure of security personnel is based on:
a. Can be extended by the client
b. The service contract between the agency and the client
c. Tenure provided by the labor
d. Labor only contracting between agency and the guard
72. Before a private security agency renders security service to its client, there must be a contract
that must bind them is called:
a. Contract Service c. Contract of Work
b. Security Service Contract d. Security Contract
73. When was of R.A. 7641 enacted:
a October 3, 1973 c. October 3, 1972
b. January 7, 1993 d. July 13, 1969
74. An act amending article 287 of Presidential Decree No. 442 as amended, otherwise known as
the Labor Code of the Philippines.
a. R.A 7641 c. R.A 5487
b. P.D. 100 d. R.A 4176
75. This is the unit under the Philippine National Police which is charged with the supervision,
direction and control of all security agencies in the Philippines.
a. PNPSAGSD c. PNPSOSIA
b. PNPSUSIA d. PCSUSIA
76. This is single proprietorship, corporations, companies or association, duly organized and
registered with the Security Exchange Commission and /or the Department of Trade and Industry.
a. Juridical Person c. Person
b. Natural Person d. none of them
77. Mr. Makabebe established a legitimate business of providing private security and detective
services and registered this business to the SEC. What kind of business does Makabebe
established?
a. Private Security Agency c. Private Security Industry
b. Private Security Business d. Private Security Detective
b. PNPCSG d. PNP
80. The one who are authorized to issue the implementing rules and regulations pertaining to
R.A. NO. 5487.
a. SAGSD c. SOSIA
b. PADPAO d. PSA
81. What G.O. is to repeat all calls from post more distant from the guardhouse where I am
station?
a. G.O. 2 c. G.O. 4
b. G.O. 6 d. G.O. 8
82. He shall not use his license and privileges to the prejudice of the public, the client or customer
and agency.
a. Ethical Standard c. Code of Conduct
b. general Order d. Security guard’s Creed
83. Whose fundamental duty is to protect lives and properties and maintained order within the
vicinity or place of duty?
a. PSA c. Security Guard
b. Private Detective d. Body Guard
84. The minimum number of directions from which each point in the area should be lighted
depending upon the use of the area.
a. Coverage Factor c. Duress Code
b. Doppler Effect d. Dry run
85. Type of code system so that security personnel when forced by armed men enter an
installation can give alarm by the use of certain words in casual conversation with other personnel
in the installation.
a. Coverage Factor c. Duress Code
b. Doppler Effect d. Dry run
86. Term applied to a device or system that in the event of failure of a component the incapacity
will be signaled.
a. Fail Safe c. Key Control
b. Inspection d. Lock
87. Defined as a mechanical, electrical, hydraulic, or electronic device to prevent entry to a building,
room, and container or hiding place.
a. Fail Safe c. Key Control
b. Inspection d. Lock
88. A term used in England for lock pickers, safecracker and penetrations of restricted rooms or
areas.
a. Protective Alarms c. Peterman
b. Restricted Area d. Security Survey
89. The maximum number of security guards that a private guards that an agency/company guard
forces may employ to include its branches.
a. 500 c. 1000
b. 200 d. 100
90. The minimum number of security guards that a private security agency may employ.
a. 200 c. 100
b. 1000 d. 500
91. The color of shirt uniform for company guards.
a. Blue c. White
b. Navy Blue d. Light Gray
92. Security services contracts between private security agencies and clients must be
______________.
a. Duly Signed c. Duly Agreed
b. Duly Authorized d. none of them
93. He operates on a covert type of mission on a specific confidential order by his agency:
a. PNP intelligence c. Military Intelligence
b. Private Detective d. Police
94. The component of communication security designed to protect transmission firm interruption,
traffic, analysis, and initiative deception.
a. Transmission Security c. Communication Security
b. Document Detective d. Deception Security
95. A conference or dialogue between the survey team and management officials of a plant
before security survey is conducted.
a. Post Conference c. Pre-conference
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
INSTRUCTION: Select the correct answer for each of the following questions. Mark only one
answer for each item by marking the box corresponding to the letter of your choice on the answer
sheet provided. STRICTLY NO ERASURES ALLOWED. Use pencil no. 1 only.
1. In the history of military intelligence and because of his greatest contribution to the field, he
was named as the father of organized military espionage.
2. An informant plays a very significant rule in intelligence gathering, clandestine operation and
infiltration operation. They undergo series of stages before they are finally listed or posted. Listed
below are the different stages or phases. One of the following is not under the phases of
informant activity being considered in police intelligence and secret service operation.
a. Training Phase c. Schooling Phase
b. Utilization phase d. Recruitment Phase
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
3. The phase of informant activity that includes execution of plans which are initiated after
recruitment for the disposal of an informant who is either no longer of value, or otherwise cannot
continue in an informant status.
a. 1234 c. 2341
b. 3214 d. 2314
5. This continues as a separate phase of informant activity until the recruited informant
becomes productive in individual becomes productive in a specific clandestine operation.
a. Termination Phase c. Training Phase
6. An informant who initially intends to furnish only limited intelligence information will offer
supply more if properly handled.
a. True c. False
b. Surveillant d. Undercover
9. SPO II Mendoza assigned as Intelligence officer of one Police office of Quezon City is
working on a sensational case. What should be the first step SPO II Mendoza should do?
a. Request for funding
b. Train his former informant
c. Recruit informant for the case
d. Assigned the case to his subordinate.
11. When a secret agent procures information about a subject openly, he is performing
collection method
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
a. Routine c. Overt
[Link] d. Covert
12. After a military offensive operation conducted by a military operatives against the ABU
sayaf group, their commander release an information to the chief of the AFP as to the location
camp of the group, their strengths and capabilities. Under the evaluation rating. The origin of
the source is interpreted as:
a. T c. X
b. V d. Y
13. Pedro is a government employee who voluntarily gives information to police as to the
whereabouts of Mario, a suspected killer in killing of the town Mayor of Abra. Pedro as an
informant will be evaluated as:
14. Roger is a confidential agent of the ISAFP who regularly furnishes information of the
activities of the New Peoples Army operating in Makati city. The information given by Roger to
the ISAFP will be evaluated as:
15. PO III Juan dela Cruz submitted an intelligence report evaluated as B-5. What is the
interpretation of this evaluated intelligence report?
16. SPO IV Romeo Tan evaluated the information gathered as “completely reliable, source
probably true”. What is the information’s evaluation rating?
a. A 5 c. A 1
b. A 4 d. A 2
17. Intelligence cycle is very important in the processing of information. A sea of information is
useless if they are not processed and analyzed, what the order of the intelligence cycle is.
1. Dissemination and use
2. Processing of Information
3. Collecting of information
4. Planning of the collection effort.
a. 4231 c. 3421
b. 3241 d. 4321
a. Interrogation c. Intelligence
b. Information d. Investigation
20. The furnishing of Intelligence data to other police unit or other government agencies so
that they can use its important is called:
a. Distribution c. Channeling
b. Furnishing d. Dissemination
21. AIEI stands for Analysis, Integration, Evaluation and Interpretation. Its purpose is to
determine that information is:
a. True and reliable d. All of the above
b. True and accurate
c. Correct and worthwhile
22. In the intelligence cycle security. This is the most important consideration the government is
trying in the protection of an informant or agent working on an intelligence mission:
A .Financial Support c. Trustworthiness
B. .Confidentiality d. Loyalty
23. A logical and orderly examination of the intelligence factors affecting the accomplishment of
the mission:
a. Situation Map c. Intelligence Files
b .Intelligence Summary d. Intelligence Estimate
24. To plan efficient and to supervise the execution of the collection of information, an
intelligence officer must thoroughly understand the following, Except:
a. The mission of the command
b. The area of operation
c. The steps in planning and executing the collection effort.
d. The name of the informant and informer.
25. Processing of information includes recording that makes information becomes intelligence.
Among the following is the best representation of recording.
b. Letters d. Sketch
26. The intelligence officer submits a regular report consistent within itself to his commander, in
the parlance of intelligence cycle, this means –
a. Reliability c. Pertinence
b. Accuracy d. Integration
27. Raw data or information are processed and analyzed to become an intelligence information
and this will be disseminate to the end users, this refers to the activity of passing information to
another.
a. Recoding c. Reporting
b. Filing d. Processing
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
a. Message c. Journal
b. OB d. File
29. All evaluated information of every description including those derived from observation,
reports, rumors, imagery, and other source from which intelligence is produced; any information
gathered or received which is of intelligence interest.
B. Investigation d. Interrogation
30. The covert observation of an area, building or stationary object in order to gain information
is called
b. Casing d. Surveillance
32. It is a circumspect inspection of place in order to determine its suitability for a particular
operational purpose.
a. Inspection c. Survey
b. Surveillance d. Casing
33. The term used for the object of surveillance is subject while the investigator conducting the
surveillance is:
a. Rabbit c. Decoy
b. Surveillant d. Target
34. When the subject identifies or obtains knowledge that the investigator is conducting a
surveillance on him, the latter is:
36. Roger, a suspected drug dealer noticed that he is being followed by a group of person every
time he is in town doing illegal business with some of his partner. In surveillance, this is called:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
37. It is a kind of Surveillance involving the use of scientific devices such as video camera,
telescope, video recorder and others is called:
38.. The type of undercover operation wherein techniques are applies for longer time and is
considered as the most different investigative activity yet the most rewarding.
a. Casing c. Undercover Operation
b. Penetration d. Surveillance
40. The type of cover using biographical data adopted for a fictitious purpose.
[Link] cover c. Cover with cover
b,Artificial cover d. Multiple cover
42. This happen when operatives operate by minimal interference from outside elements like
posting as a waiter in a restaurant during a buy bust operation.
43. Pedro is a thief who is eyeing at the handbag of Maria. POI Santos Reyes is standing a few
meters from Maria. The thief’s desire to steal is not diminished by the presence of the police
officer but the ____ for successful theft is there.
a. Ambition c. Intention
b. Felling d. Opportunity
44. Henry, a CIA agent sneaks into a building and steal information in the Iranian embassy, his
operation was compromised. If you are the agent handler what will be your advice to Henry.
a. Do nothing c. Surrender
45. In cover and undercover operation, Intelligence can and should do nothing more than
.
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
[Link] service requires rigid secrecy in its operation, In the debriefing, the intelligence
agent is asked to discuss which of the following:
48. The most important purpose of counter intelligence in the existence of a police
office.
b. Surveillance d. Reconnaissance
b. Active-defensive d. Defensive-offensive
a. Hideout c. concealment
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
54. Counter intelligence often requires a defensive action. One of the following is not a
counter intelligence activity.
a. Recruitment
b. Many informers or informants
c. Leak information
d. Too many intelligence operatives
56. An inquiry into the character, reputation, discretion as loyalty of a person in order
to determine a person’s suitability or access to classified matter prior to the granting of
security clearance.
57. Document information was supplied by the Regional Office of the National Bureau
of Investigation in response to an inquiry of a Police Intelligence Unit. The said
document will be treated as a record coming from:
59. The best document to check the identity of a criminal in the country.
61. This refers to the entire inspection of a place in order to determine the
vulnerabilities and criticalities of the place related to intelligence interest.
b. Casing d. Reconnaissance
62. Security survey and investigation is generally conducted because of the following
objectives except:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
63. PO 1 Jester Dela Cruz was assigned to conduct security survey of a proposed safe house
of intelligence operatives, he should recommend a place that is:
64. The most important aspect of security survey and investigation related to the inspection of
an entire facility of an intelligence interest.
a. Analysis c. Evaluation
65. A continuous and systematic program designed to meet the security needs of an
intelligence office or unit in a police office.
66. Security orientation is the initial briefings of intelligence operatives regarding their mission;
whereas is selling others
67. An intelligence operatives or agents during his security survey was “burned out” this
means:
a. The agent/operative was fired
b. The agent/operative was identified and known
c. The agent/operative was suspected of being a double agent.
d. The agent/operative was ineffective.
68. Which is the best source of information on criminal, criminal activities, and even subversive
group when conducting security survey investigation?
69. When investigating a place suspected of doing illegal activity, the operatives should always
consider :
71. The weakness which make it susceptible to any action which reduces its fighting potentials.
[Link] c. Vulnerability
[Link] d. Adaptations
72. Related to Information and materials released by any government office, the
unauthorized disclosure of which would cause exceptionally grave damage to the nation,
politically, economically or military.
a. Restricted c. Confidential
73. Under the documents and information security guidelines. Who is authorized to classify
top secret matter?
[Link] c. cryptogram
[Link] d. cryptography
75. The requirement that the dissemination of classified matters be limited strictly to those
persons who are police officials.
76. A document classified in nature or unclassified, compiled and published before it will be
disposed should be shredded and burned, this action is always taken into consideration because
if the document is not properly disposed then it will compromise any operation of the intelligence
unit. This is because
.
a. It is a matter of national interest
b. It requires highest level of security
c. It is a rule
d. It is a practice
77. The Information and material whose unauthorized disclosure would endanger national
security, cause serious injury to the interest and prestige of nation.
a. Secret
b. Security
c. Confidential
d. Plan
78. The information and material that require special protection other than determined to be
top secret.
a. Confidential
b. Intelligence
c. Records
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600
d. Restricted
a. Destruction
b. Destroy
c. Storage
d. None of the above
80. The original classification for assignment of top secret categories exclusively rest with the
head of the department.
a. True c. Either
b. False d. Neither
81. The changing of the classification of classified matter to category higher than that
previously assigned to it.
[Link]
[Link] [Link]
[Link]
82. Is an object which has been placed into orbit by human endeavor use to monitor
activities in the earth.
[Link]
[Link] [Link] Tower
[Link]
[Link] [Link]
84. Police Inspector R. Mustang, was assigned as a City Director of the Western Police
District. Many of the intelligence operations information of the police office leaked to
outside elements. What should police inspector R. Mustang do to avoid future repetition
of leak information in his area of responsibility?
85. It is consider the best equipment in counter- intelligence operations as far as air and
maritime surveillance is concerned.
86. Under R.A. 4200 otherwise known as the anti-wire tapping law prohibits the
following, except:
87. The FBI was tapping the phone line of the suspected spy"; "Is this hotel room bugged"
wiretap, bug, tap or eavesdrop?
a. Yes d. Either
b. No
c. Neither
[Link] [Link] in
[Link] [Link]
89. Pedro went close to the door of the office of the chief of police purposely to hear
communication between the chief and his visitor. Pedro is in the act of ____.
[Link]
[Link]
c. Listen in
[Link]
91. Mr. James is an alien, who assisted Mr. Dela Cruz a Filipino Citizen in tapping the
communications between his general manager and client regarding an illegal business
transaction, if Mr. James will be convicted of violating R.A. no. 4200 what is his possible
penalty?
a) 12 years c. Disqualification from public office
92. One of the following is not a device or equipment used to secretly overhear intercept or
records information or spoken word.
93. Considered the best weapon system of terrorist because of its impact and damage to the
populace.
a. Encoding c. Processing
b. Labeling d. Decoding
96. This distinguished from other acts of violence, civil disturbance and from war is:
a. Terrorist c. Extremism
b. Terorism d. Terorista
97. Juan is a member of a high school fraternity terrorizing students and creating fear
among the whole students. Is the act of “Juan” constitute terrorism?
a) True c. False
98. One of the following act is not included in a crime of terrorism as punished under R.A.
9372.
a) Murder c. Kidnapping
99. X, with intent to kill Y who is inside the restaurant suddenly throw a hand grenade killing Y
instantly and killing and injuring at least more than ten people in the spot. Is the act of X
constituting a crime of terrorism?
a) True c. Either
b) False d. Neither
100. This is single proprietorship, corporations, companies or association, duly organized and
registered with the Security Exchange Commission and /or the Department of Trade and Industry.
a. Juridical Person c. Person
b. Natural Person d. none of them