0% found this document useful (0 votes)
163 views33 pages

Lea - Industrial Security Management W Ans

The document is a mock board exam for industrial security management consisting of 24 multiple choice questions. It covers various topics related to personnel security such as personnel security investigations, background investigations, deception detection techniques, and security education. The questions test knowledge of concepts like personnel security, sensitive data, auditable processes, and visitor movement control.

Uploaded by

Aimae Eata Eala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
163 views33 pages

Lea - Industrial Security Management W Ans

The document is a mock board exam for industrial security management consisting of 24 multiple choice questions. It covers various topics related to personnel security such as personnel security investigations, background investigations, deception detection techniques, and security education. The questions test knowledge of concepts like personnel security, sensitive data, auditable processes, and visitor movement control.

Uploaded by

Aimae Eata Eala
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd

SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY

General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

COMPILATION ON

INDUSTRIAL SECURITY MANAGEMENT


WITH ANSWER

PREPARED BY:

KENRUSS B. CALION
APOLLO M. CAYSIDO JR.
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

MOCK BOARD EXAMINATION IN INDUSTRIAL SECURITY


MANAGEMENT
SET A

INSTRUCTION: Select the correct answer for each of the following questions. Mark only one
answer for each item by marking the box corresponding to the letter of your choice on the answer
sheet provided. STRICTLY NO ERASURES ALLOWED. Use pencil no. 1 only.

1. The badge or pass coded for authorization to enter specific areas is issued to an em-
ployee who keeps it in his possession until his authorization is terminates.

a. Single Pass System c. Multiple Pass System

b. Pass Exchange System d. Visitor’s Logbook

2. An exchange takes place at the entrance of each controlled area. Upon leaving the per-
sonnel surrender his badge or pass and retrieve back his basic identification.

a. Visitor’s Logbook c. Pass Exchange System

b. Multiple Pass System d. Single Pass System

3. This provides an extra measure of security by requiring that an exchange take place at
the entrance of each restricted area.

a. Visitor’s Logbook c. Pass Exchange System

b. Single Pass System d. Multiple Pass System

4. All visitors to any facility should be required to identify themselves and should be given a
visitor’s ID by the security. Visitor’s logbook should be filled up with the named of visitors,
nature and duration of visit.

a. Photograph c. Pass Exchange System

b. Single Pass System d. Visitor’s Logbook

5. if a visitor has camera and it is prohibited to take picture, said camera should be left in
the care of security with corresponding receipt.
a. Escort c. Pass Exchange System

b. Single Pass System d. Photograph

6. If possible visitors should be escorted by the security to monitor their activity within the
establishment and guide them where to go.

a. Escort c. Pass Exchange System

b. Single Pass System d. Photograph

7. Separate access for visitors and employees of the establishment should be provided.
a. Visitor entrances c. Pass Exchange System

b. Single Pass System d. Photograph

8. If there is a long delay or time lapse between the departure and arrival, the visitors may
be required to show cause of the delay.
a. Photograph c. Pass Exchange System
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

b. Single Pass System d. Time Traveled

9. Refers to those practices, technologies and/or services used to ensure that personnel se-
curity safeguards are applied.

a. Photograph c. Pass Exchange System

b. Visitor Movement Control d. Personnel Security

10. This is as important as physical security personnel, security starts even before the hiring
of an employee and remains to be maintained for as long as the person is employed.
a. Personal security c. Auditable process

b. Sensitive Data/Information d. Personnel Security

11. Refers to specific documentation which can be a manual or an automated process that
provides sufficient that will allow one to trace the events of an action that has taken place.
a. Personnel Security c. Auditable process

b. Sensitive Data/Information d. Personnel process

12. Refers to critical information for which the unauthorized access, loss, misuse, modifica-
tion, or improper disclosure could negatively impact the ability of the entity or agency to
provide services and benefits to its customers.

a. Personnel Security c. Auditable process

b. Sensitive Data/Information d. A & B

13. Refers to information that involves the privacy to which individuals are entitled by law.
a. Personnel Security c. Sensitive Data/Information

b. Auditable process d. Confidential Data/Information

14. A process of inquiry into the character, reputation, discretion, integrity, morals and loyalty
of an individual to determine the suitability for appointment or access to classified matter.

a. Sensitive Data/Information c. Personnel Security

b. Personnel Security Investigation(PSI) d. Confidential Data/Information

15. This technique is very expensive but necessary in personnel security. It serves to verify
information on the application form and to obtain other information pertinent to the deci-
sion to employ.

a. Positive Vetting c. Personnel Security

b. Background Investigation d. Local Agency Check

16. Is a BI activity where the sources of information involve only the local agencies in the
community such as the local government units?

a. Background Investigation c. Personnel investigation

b. National Agency d. Local Agency Check


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

17. Like the local agency check, NAC is also a BI activity but the source of information in-
volves the national government units.

a. International Investigation c. Personnel information

b. National Agency Check d. Local Agency Check

18. Is the process of inspecting of examining with careful thoroughness? The essence of
vetting that it is a personal; interview conducted under stress. It is based on information
previously given by the applicant. Other information sued during the interview, such as
those discovered in the BI. This affirms or denies this given by the applicant.
a. Positive Vetting c. Personnel Security

b. Background Investigation d. Local Agency Check

19. Is the process whereby a subject’s reaction in a failure critical situation is predicted by ob-
serving his behavior, or by interviewing him, or analyzing his responses to a question-
naire, such as an honesty test?

a. Profiling c. Positive Vetting

b. Background Investigation d. Deception Detection Techniques

20. This is a process of using devices in detecting deception during the interview stage.
a. Financial and Lifestyle Inquiry c. Positive Vetting

b. Background Investigation d. Deception Detection Techniques

21. This type of investigation seeks to gather information on income and mode of living,
sometimes referred to as the earning-to-debt-ration.
a. Deception Detection Techniques c. Positive Vetting

b. Background Investigation [Link] and Lifestyle In-


quiry

22. This is the placement of an agent in a role in which the agent’s true identity and role
remains unknown in order to obtain information for criminal prosecution or for recovery or
limitation of asset losses.
a. Deception Detection Techniques c. Positive Vetting

b. Background Investigation d. Undercover Investigation

23. This is a valuable tool because it gives departing employees an opportunity to list
grievances. It offers managers an opportunity to learn of problems not previously known.

a. Interrogation c. Undercover Investigation

b. Exit Interview [Link]

24. It is conducted to develop security awareness among employees of the company. It


should cover all employees regardless of rank or position

a. Security Education c. Physical Investigation

b. General Interview [Link] Measures


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

25. it is the first contact of the prospective employee wherein the interviewer determine the
suitability of the applicant for employment through his give answers on the different type
of questions is being conducted.
a. Interview c. Initial Interview

b. Initial Interrogation [Link] Measures

26. It is in this stage where new employees received detailed presentation of personnel
security policy. Usually handouts or employees manual are being distributed for
reference.
a. Interview c. Initial Interview

b. Orientation and Training d. seminars

27. It is design to remind employees of the company about their responsibilities, review the
guidelines and policies, introduction of new policies and regulations and a moment of
getting employees feedback about the company policies that is being implemented.

a. Security Reminders c. Initial Interview

b. Refresher Conference [Link] and Training

28. A phase which employs an indirect approach of educating the employees such as posting
security posters and distributing fliers.
a. Security Reminders c. Initial Interview

b. Refresher Conference d. Orientation and Training

29. It is the act of emphasizing the importance and role of security achieving the company
goals and objectives. It involves securing employee cooperation and support.

a. Security Reminders c. Security Promotion

b. Security Conference d. Security measures

30. It is the protection of records from its entire document life cycle. It also connotes in this
context the safeguarding classifieds matters. This involves the protection of documents
and classified papers from loss, access by unauthorized persons, damage, theft and
compromise through disclosure.
a. Document Security c. Document Promotion

b. Security Conference d. Information Security

31. Is the aspect of security which involves the application of security measures for the
proper protection and safeguarding of classified information.
a. Document Privacy c. Document Promotion

b. Document Security System d. Information Security

32. These are information and material (matter), the unauthorized disclosure of which would
cause exceptionally grave damage to the nation, politically, economically of from a secu-
rity aspect.
a. Secret Matters c. Super Secret matters

b. Top Secret Matter d. confidential Matters


33. These information and material (matter), the unauthorized disclosure of which would en-
danger national security, cause serious injury to the interest or prestige of the nation or of
any government activity or would be of great advantage to a foreign nation.
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

a. Secret Matters c. Restricted Matters

b. Top Secret Matter d. Confidential Matters

34. These information and material (matter), the unauthorized disclosure of which, while not
endangering the national security, would be prejudicial to the interest or prestige of the
nation or any government activity, or would cause administrative embarrassment or un-
warranted injury to an individual or would be of advantage to a foreign nation.
a. Secret Matters c. Restricted Matters

b. Top Secret Matter d. Confidential Matters

35. These are information and materials (matter), which requires special protection other
than that determined to be top secret, secret, and confidential.
a. Secret Matters c. Restricted Matters

b. Top Secret Matter d. Confidential Matters

36. What is the color code use for a TOP SECRET INFORMATION?
a. Green color code c. white color code

b. Red color code d. blue color code

37. What is the color code use for a SECRET INFORMATION?


a. Green color code c. white color code

b. Red color code d. bluecolor code

38. What is the color code use for a CONFIDENTIAL INFORMATION?


a. Green color code c. white color code

b. Red color code d. blue color code

39. What is the color code use for a RESTRICTED INFORMATION?


a. Green color code c. white color code

b. Red color code d. blue color code

40. Means protecting information and information systems from unauthorized access, use,
disclosure, disruption. Modification or Destruction.
a. Information Security c. Information keeping

b. Information Privacy d. All of the above

41. It is information that in some special way relates to the status or activities of the
possessor and over which the possessor asserts ownership
a. Top Secret Information c. Information

b. Proprietary Information d. B & C

42. This consists of any formula, pattern, device or compilation of information which is used
in one’s business and which gives him an opportunity to gain the advantage over com-
petitors who do not know or use it. It may be a formula for chemical compound a process
of manufacturing, treating or preserving materials, a pattern for machine or device or list
of customers.

a. Trade Secret c. Information


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

b. Business Secret d. None of the above

43. This is a grant made by the government to inventor, conveying or securing to him the ex-
clusive right to make, use or sell his invention for term years.
a. Trade Secret c. Government Secret

b. Patents d. None of the above

44. Is a requisite for maintaining the privacy of the people whose personal information the or-
ganization holds.
a. Confidentially c. Integrity

b. Secrecy d. Availability

45. In information security, integrity means that data cannot be created, changed or deleted
without authorization.
a. Confidentially c. Integrity

b. Secrecy d. Availability

46. The concept of availability means that the information, the computing systems used to
process the information, and the security controls used to protect the information is all
available and functioning correctly when the information is needed. The opposite of avail-
ability is denial of service.

a. Confidentially c. Integrity

b. Secrecy d. Availability

47. Consists of approved written policies, procedures, standards and guidelines.


Administrative controls from the framework for running the business and managing
people.
a. Administrative Control c. Control of responsibilities

b. Logical Control d. Physical Control

48. Use software and data to monitor and control access to information and computing
systems.
a. Physical Control c. Control of responsibilities

b. Logical Control d. Administrative Control

49. Monitor and control the environment of the work place and computing facilities. They also
monitor and control access to and from such facilities.
a. Physical Control c. Administrative Control

b. Logical Control d. None of the above

50. Information security uses cryptography to transform usable information into a form that
renders it unusable by anyone other than an authorized user; this process is called
__________.
a. Encryption c. Cryptography

b. Coding d. None of the above


51. Is used in information security to protect information from unauthorized or accidental
discloser while information is in transit.
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

a. Cyphers c. Cryptography

b. Coding d. None of the above

52. This provides information security with other useful applications as well as including im-
proved authentication methods, message digests, digital signatures, non-repudiation and
encrypted network communications.

a. Cyphers c. Cryptography

b. Coding d. None of the above

53. They considered as the weakest link in the security chain?

a. Personnel c. security guards

b. Manager d. assistant manager

54. This is important to make security personnel conscious and realize the value of docu-
ment. This is also necessary for the practice “Need to Know” principle

a. Trainings c. Practice

b. Drills d. A & C

55. Is defined as a critical on-site examination and analysis of an industrial plant. Business, a
home or public or private institution done to ascertain the facility’s current security status,
to identify deficiencies or excess in current practices, to determine what protection is
needed and to make recommendations for improving the overall level of security at that
installation.
a. Security Survey c. Practice

b. Security Inspection d. None of the above

56. Is conducted for two reasons: to check on the degree of compliance with the
recommended countermeasures and to determine the effectiveness and adequacy of the
countermeasures which are in effect.
a. Security Survey c. Security Investigation

b. Security Inspection d. Security Hazards

57. Is a planned and organized determination of facts concerning specific loss or damage of
assets due to threats, hazards or unsecured conditions.
a. Security Survey c. Security Investigation

b. Security Inspection d. Security Hazards

58. Acts or conditions which result in a situation conducive to a breach of the protection
system and the subsequent loss or compromise of defense information, secrets or
damage to personnel, property or facilitates.
a. Security Survey c. Security Investigation

b. Security Inspection d. Security Hazards

59. One who steals due to his inability to resist the unexpected opportunity and has little fear
of detection.

a. Casual Pilferer c. Pilferer


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

b. Systematic Pilferer d. B & C

60. Steals with pre-conceived plans and takes away any or all types of suppliers or items for
economic gain.
a. Casual Pilferer c. Pilferer

b. Systematic Pilferer d. None of the above

61. Is called a private security guard or watchman that include and person who offers or ren-
ders personal service to watch or secure either a residence or business establishment or
both for hire or compensation and with license to exercise profession

a. Security Guard c. Guard

b. Security d. Personnel

62. It is a group of selected men, trained or grouped into functional unit for the purpose of
protecting operational process from those disruptions at a particular plant, facility, instal-
lation or special activity.

a. Security Guard c. Group Guard

b. Security Guard Force d. Personnel


63. Any person association, partnership, firm or private corporation, who contracts, recruits,
trains, furnishes or post any security guard, to do its functional or solicit individual busi-
ness firms, or private, public or government-owned or controlled corporations to engage
his/it’s service or those of his/it’s security guards, for hire commission or compensation

a. Security Guard c. Company Security Agency

b. Public Security Agency d. Private Security Agency

64. A security force maintained and operated any private company for its own security re-
quirements only.

a. Company Security Agency c. Private Security Agency

b. Public Security Agency [Link] Security

65. A security unit maintained and operated by any government entity other than military and
police which is established and maintained for the purpose of securing the office or com-
pound and extension such government entity.

a. Company Security Agency c. Private Security Agency

b. Public Security Agency [Link] Security

66. Otherwise known as the National Police Act of 1991.

a. RA 6975 c. RA 9165

b. PD 603 [Link] 9344

67. As used herein shall refer to the current PNP Civil Security Group Agency and Guard
Supervision Division or any other PNP office that may be designated later as the primary
office for supervision of the implementation of these rules and regulations.
a. SAGSD c. PADPAO

b. PNP [Link]

68. PADPAO means ______?


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

a. Philippines Association of Detective and Protective Agency Operations


b. Philippines Association of Detective and Protection Agency Operatives
c. Philippines Association for Detection and Protection Agency Operation
d. None of the above

69. The one who are authorized to issue the implementing rules and regulations pertaining to
R.A. NO.548

a. SAGSD c. PADPAO

b. PNP [Link]

70. Any Filipino Citizen or corporation association, partnership, one hundred percent (100%)
of which is owned and controlled by Filipino Citizen. Can organize security guard, watch-
men, or detective agency.

a. TRUE c. MAYBE

b. FALSE [Link] of the above

71. What is the basic age requirement of an operator or manager of agency?

a. Not less than 25 years old of age c. Not less than 22 years old of age

b. Not more than 25 years old of age [Link] less than 20 years old of age
72. How much is the minimum capitalization to start business like security guard, watchmen,
or detective agency.

a. Minimum capitalization of two million (2,000,000) with minimum bank deposit of five
hundred thousand (500,000) pesos in order to start its business.
b. Minimum capitalization of one million (1,000,000) with minimum bank deposit of
five hundred thousand (500,000) pesos in order to start its business.
c. Minimum capitalization of five hundred thousand (500,000) with minimum bank deposit
of one hundred thousand (100,000) pesos in order to start its business.
d. Minimum capitalization of five million (5,000,000) with minimum bank deposit of one
million (1,000,000) pesos in order to start its business.

73. Can a Filipino high school graduate qualified to be a security guard?

a. Yes c. MAYBE

b. No [Link] of the above

74. What is the age qualification for new applicant and SG’s in supervisory position?

a. Not less than 20 of age nor more than 50 years old


b. Not less than 18 of age nor more than 50 years old
c. Not less than 20 of age nor more than 30 years old
d. Not less than 18 of age nor more than 40 years old

75. No regular license shall be granted to any private security agency unless it has minimum
of _____?

a. (200) licensed private security personnel under its employ


b. (50) licensed private security personnel under its employ
c. (100) licensed private security personnel under its employ
d. (150) licensed private security personnel under its employ

76. No regular license shall be granted to any company guards’ force or private detective
agency unless it has minimum of _____?
a. (10) licensed private security personnel under its employ
b. (50) licensed private security personnel under its employ
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

c. (30) licensed private security personnel under its employ


d. (20) licensed private security personnel under its employ

77. What is the maximum number of private security personnel that a PSA/CGF/PDA may
employ?

a. one thousand (1000) c. five hundred (500)

b. two thousand (2000) d. one thousand five hundred


(1500)

78. How many years is the validity of the License to Operate of a security agency?

a. 1 year c. 3 years

b. 2 years d. 5 years

79. A temporary license is issued by the ________ THRU civil Security Group Directorate af-
ter the applicant/licenses should have complied with all the requirements while it has less
than two hundred guards?

a. SAGSD c. PADPAO

b. PNP [Link]

80. A _______ to operate is issued to the PSA once it is qualified of having two hundred
(200) or more license security guard in its employ duly posted.

a. Regular License c. Permit License

b. Temporary License d. Duty License

81. Regular license is renewable every how many years?


a. 1 year c. 3 years

b. 2 years d. 5 years

82. The use of expired license is not allowed. In case of doubt, licenses may be verified at
_______ whether valid or fake.

a. PNP SAGSD c. PADPAO

b. DOJ [Link]
83. Firearm’s license-all firearms of the security agency should be covered with firearms li-
cense issued by the PNP through its ____________.

a. Firearms Explosive Division under Civil Security Group


b. Scene of the crime operation
c. Philippine drug and enforcement agency
d. None of the above

84. Firearm’s license-all firearms of the security agency is renewable every _______. No du-
plication of two or more firearms with the same make and serial number shall be covered
by one license.

a. 1 year c. 3 years

b. 2 years d. 5 years

85. Personnel security involves the following except:

a. Hiring c. Training
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

b. Promotion d. Practice

86. How many hours is the duration of Pre-licensing Training Course?

a. 150 hrs. c. 50 hrs.

b. 100 hrs. d. 120 hrs.

87. How many hours is the duration of Re-Training Course?

a. 48 hrs. c. 12 hrs.

b. 72 hrs. d. 24 hrs.

88. How many hours is the duration of Supervisory Course?

a. 72 hrs. c. 48 hrs.

b. 12 hrs. d. 24 hrs.

89. How many hours is the duration of Security Officer Training Course?

a. 150 hrs. c. 250 hrs.

b. 200 hrs. d. 300 hrs.

90. Issues license to posses firearm to security Agencies.

a. Detachment Commander c. Security Director

b. PNP Director General d. Chief Inspector

91. Firearms to be carried only during ___________ while in proper uniform.

a. Morning [Link] to a crime

b. Tour of Duty d. night

92. The total number of high powered firearms that an agency or security force/unit is autho-
rized to possess shall not exceed ______?

a. 20 % c. 10 %

b. 15 % d. 30 %

93. Is a written instructions issued by the agency to its guards to perform lawful activity at
specific time, place and date.

a. Court Order c. Document Security

b. Mission Order d. permit

94. Who established the first national private security and investigation company in the
United States?

a. Allan Pinkerton c. Edwin Holmes

b. August Pope d. James Surgent


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

95. Who patented one of the first Burglar alarms?

a. Allan Pinkerton c. Edwin Holmes

b. August Pope d. James Surgent

96. He introduced the first central station burglar alarm?

a. Allan Pinkerton c. Edwin Holmes

b. August Pope d. James Surgent

97. He introduced the first armored carriage for the transportation of money and valuables.

a. August Pope c. Edwin Holmes

b. Allan Pinkerton d. Washington Perry Brinks

98. He invented, introduced the modern combination lock. Bankers quickly adopted Yale’s
lock for their safes.

a. Linus Yale Jr. c. Walter Bruch

b. James Surgent d. Allan Pinkerton

99. The first city in United States to install video cameras along its main business street in an
effort to fight crime.

a. Olean, New York c. Las Vegas Nevada

b. Sta. Monica, California D. Los Angeles California

100. Is a branch of information security applied to both theoretical and actual computer sys-
tem. A branch of computer science that addresses enforcement of secure behavior on
the operation of computer.

a. Computer security c. application security

b. Data security d. Information security


MOCK BOARD EXAMINATION IN INDUSTRIAL SECURITY
MANAGEMENT
SET B

INSTRUCTION: Select the correct answer for each of the following questions. Mark only one
answer for each item by marking the box corresponding to the letter of your choice on the answer
sheet provided. STRICTLY NO ERASURES ALLOWED. Use pencil no. 1 only.

1. Is the means of ensuring that data is kept safe from the corruption and that access to it is
suitably controlled.

a. Computer security c. application security

b. Data security d. Information security

2. Encompasses measures taken to prevent exceptions in the security policy of an application


or the underlying system through flaws in the design, development, or destruction of the
application.

c. Computer security c. application security


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

d. Data security d. Information security

3. Means protecting information and information system from unauthorized access, use,
disclosure, disruption, modification, or destruction.

e. Information security c. network security

f. application security d. Data security

4. Consists of the provision made in an underlying computer network infrastructure, policies


adopted by network administrator to protect the network and the network -accessible
resources from unauthorized access and the effectiveness (or lack) of the measures
combined together.

g. Information security c. network security

h. application security d. Data security

5. Describes measures that prevent or deter attackers from accessing a facility, resources, or
information, stored on Physical media.

i. Physical security c. shopping Center Security

j. Airport security d. Home security

6. A type of security which is concern with the protection of the stores, ware houses, storage,
its immediate premises and properties as well as supermarket personnel and customers.

k. shopping Center Security c .Airport security

l. Physical security d. Home security

7. Refers to the techniques and methods used in protecting airports and by extension aircraft
from crime and terrorism.

m. Physical security c. shopping Center Security

n. Airport security d. Home security

8. Are those methods use of protecting residential homes or town site which includes the
interior protection of houses against property losses or damages.

o. Physical security c. shopping Center Security

p. Airport security d. Home security

9. This was a body of Rural Police organized in each town and establishment by Royal
Decree of January 8, 1836.

q. The Guardia Civil c. The Guardrilleros

r. Carabineros de SeguridadPublica d. The American Occupation

10. This legislative Act, otherwise known as Tolentino Law.

s. Commonwealth Act No. 343 c. Republic Act No. 4864


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

t. Executive Order 308 d. Republic Act No. 6040

11. . Unit that shall perform all police functions over Philippine territorial waters and rivers
including ports of entry and exit.
a. Police Intelligence c. Police Security
b .Maritime Command/Police d. Special Action
Command/Force
12. Serves as a mobile strike force or reaction unit to augment regional, provincial, municipal and
city police forces
a. Special Action Command/Force c .Aviation Security
Command/Force
u. Maritime Command/Police d. Medical and Dental Service
13. Headed by a Director with a rank of Chief Superintendent which shall provide scientific and
technical investigate aid and support to the PNP and other government investigate agencies.
a. Administrative Support Unit c. Crime Laboratory
c. PNP national offices d. Logistic Support Service

14. Unit shall serve as the intelligence and counter intelligence operating unit of the PNP
a. Police Security c. Special Action Command
b. Police Intelligence d. Police Community Relarions
15. Type “A” for the cities with population ranging from ________ and above;
a.150, 000 c.75, 000
b. 50,000 d.100, 000
16. Type: A: for the municipalities with population ranging from _____ and more;
a.75, 000 c.60, 000
b.85, 000 d.50, 000

17. Appointed by the President among the Senior Officers down to the rank of Chief
Superintendent in Service.
a. Police Inspector c. Police Director General
b. Police Senior Superintendent d. Police Deputy Director
General

18. Awarded to any member of the PNP, a deed of personal bravery and self sacrifice.
a. Medalyang Kabayanihan [Link] Katapatang Paglilingkod
b. Medalyang Katapangan [Link] Kagitingan

19. Awarded to any member of the PNP for gallantry in action not warranting the award of
medalyangkagitingan.
a. MedalyangKatapangan [Link]
[Link] d..MedalyangKagitingan

20. Refers to any offense committed by a PNP member affecting order and discipline within the
police organization
a. Exclusive Jurisdiction c. Breach on Internal Discipline
b. Memorandum Circular no. 2007-001 d. Citizen’s Complaint

21. A complaint or charge filed against a PNP member shall be heard and decided exclusively by
the disciplining authority that has acquired original jurisdiction.
[Link] Circular no. 2007-001 [Link]’s Complaint
[Link] Jurisdiction d. Breach on Internal
Discipline

22. One of the disciplinary tool of the PNP that hear and decide citizen’s complaints or cases filed
before it against erring officers of the PNP.
a. PLEB c. NAB
[Link] [Link]

23. Is an attempt by administration to allocate anticipated resources to meet anticipated service


demands.
a. Planning c. Police Planning
c. Organizing d. Leading
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

24. Is the process of dividing work to be done and coordinating results to achieve desired purpose
a. Organizing c. Leading
b. Planning d. Controlling

25. Are designed to meet the long-range, overall goals of the organization.
a. Operational Plans c. Strategic Plans
b. Standing plans d. Time specific Plans

26. Procedures intended to be used in all situations of all kinds shall be outlined as a guide to
officers and men in field
a. Headquarters Procedure c. Special Operating Procedure
b. Field Procedures d. Procedural Plan

27. Production of intelligence essential to prevention of crimes and the investigation, arrest and
prosecution of criminal offenders
a. Counter Intelligence c .Criminal Intelligence
b. Public Safety Intelligence d. Internal Security Intelligence

28. King of Intelligence covers the activity devoted in destroying the effectiveness of hostile foreign
activities and to protection of info against espionage, subversion and sabotage
a. Counter Intelligence c. Line Intelligence
b. Strategic Intelligence [Link] Safety Intelligence

29. Awarded to members of the PNP for demonstrated exemplary efficiency, devotion and loyalty to
their duty assignments.
a. MedalyangKasanayan c. MedalyangPapuri
[Link] d. MedalyangMabutingasal

30. It is the concern of DILG to provide this assistance for its personnel
a. Health and Welfare c. Retirement Benefit
b. Longevity pays and allowance d.. Permanent Physical Disability

31. This was created by a Royal Decree, to partially relieve the Spanish Peninsular Troops of their
work in policing towns.
a. Philippine Republic c. The Guardia Civil
b. The Guardrilleros [Link] de SeguridadPublic

32. Embodying the Peace and Order Special account made the payment of Police Salary subsides
which was a morale booster to the underpaid law enforces
a. R.A no. 6134 c. R.A no. 1623
b. R.A no. 6111 d.R.A no 1756

33. Awarded to PNP members and civilian personnel of the Republic of the Philippines and of
friendly foreign nations for distinguished or extraordinary achievement or service in the
advancement of science, socio-economic to public service of the highest order
a. Medalya ng katangitanging gawa c. Medalya ng Kadakilaan
b. Medalya ng Kasanayan [Link] ng Papuri

34. The heads of the regional offices with the rank of Chief Superintendent shall assume the
position title of _______?
a. Deputy Provincial Director c. Regional Director
b. District Director d. Deputy District Director

35. The manning levels of the PNP shall be approximately in accordance with a police to population
ratio of one policeman for every ____?
a. 400 person c.100 persons
b. 500 person d.300 persons

36. The Private Agency Law has been amended by?


a .R.A 7641 c. R.A. 5487
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

b. P.D 100 d. P.D. 96

37. To review an appealed case wherein the penalty imposed by the adjudication Board is removal
or dismissal from the service within 15 days.
a. Special appellate Committee c. Integrated National Police
b. General Supervision d. Personnel Development Standards

38. This is important to make security personnel conscious and realize the value of document.
This is also necessary for the practice “Need to Know” principle
a. Trainings c. Practice

b. Drills d. A & C

[Link] is the first contact of the prospective employee wherein the interviewer determine the
suitability of the applicant for employment through his give answers on the different type of
questions is being conducted.
a. Interview c. Initial Interview

b. Interrogation d. Security Measures

40. Enacted to promote career development in police service by establishing uniform INP
personnel development standards.
a. General Supervision over INP Units c. Personnel Development Standards
b. Integrated National Police d. Operational Supervision

41. Type of lock that can be opened by pressing a series of numbered buttons in proper
sequence
a. Padlock c. Code operated lock
b. Combination lock d. Electrical lock
42. Type of lock that can be opened and closed remotely
a. Padlock c. Code operated lock
b. Combination lock d. Electrical lock

43. Detachable lock having a sliding hasp which passes through a staple ring
a. Padlock c. Code operated lock
b. Combination lock d. Electrical lock

44. Separate access for visitors and employees of the establishment should be provided.
a. Visitor entrances c. Pass Exchange System

b. Single Pass System d. Photograph

45. The first city in United States to install video cameras along its main business street in an
effort to fight crime.
a .Olean, New York c. Las Vegas Nevada
b. Sta. Monica, California d. Los Angeles California

46. Can a Filipino high school graduate qualified to be a security guard?


a. Yes c. MAYBE

b. No d. None of the above

47. These are information and material (matter), the unauthorized disclosure of which would
cause exceptionally grave damage to the nation, politically, economically of from a security
aspect.
a. Secret Matters c. Super-Secret matters

b. Top Secret Matter d. confidential Matters


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

48. The one who are authorized to issue the implementing rules and regulations pertaining to
R.A. NO.548
a. SAGSD c. PADPAO

b. PNP d. DILG
49. What is the color code use for a RESTRICTED INFORMATION?
a. Green color code c. white color code

[Link] color code d. blue color code


50. In 1950’s private security agencies/guard were under the supervision and control of the
___________.
a. Philippine Constabulary c. INP
b. Municipal/City Mayor d. PCSUSIA
51. What barrier is established to protect the surrounding of an installation?
a. Animal Barrier c. Energy Barrier
b.. Human Barrier d. Structural Barrier
52. A more in-depth study including risk management, analysis of risk factors, environmental and
physiological security, and analysis of crime patterns, fraud and internal theft is:
a. Security Analysis c Appraisal
b. Building Inspection d. Security Survey
53. The simplest form of lock is the:
a. Ward Lock c. Cylinder Lock
b.. Yale Lock d. Combination
54. Which of the following should not be issued to a private security guard under normal
condition?
a. Cal. 45 c. Cal. 38
b. Magnum .22 d.12 Gauge Shotgun
55. Which of the following is not a line leadership staff?
a. Detachment Commander c. Inspector
b. Chief Inspector d. Post-in-charge
56. A regular license to operate is issued to any private security agency having:
a. 200 guards or more but not exceeding 500.
b. 100 guards or more but not exceeding 1,000.
c. 200 guards or more but not exceeding 1,000.
d. 150 guards or more but not exceeding 1,000.
57. How many pieces of licensed firearms a PSA with 100 guards must initially procure?
a. 70 c. 25
b. 50 d. 30
58. What is the minimum number of contracted security guards for guards for private security
agency branch offices?
a. 10 c. 20
b. 30 d. 50
59. The application for license to exercise security profession and/or permit to operate a private
security agency shall be filed with the office of the:
a. Chief PNP thru, PNP SAGSD
b. Sec. DILG
c. Securities Exchange Commission
d. Chief PNP-SAGSD
60. The issuance of a key to open main entrance gate and office is called:
a. Coded Lock c. Solitary Lock
b. Mason Keying d. Key Control
61. The security force maintained and operated by any private company and guard system?
a. Company guard force c. Private Security Agency
b. Government Security Unit d. none of them
62. A system used in big installation whereby keys can open a group or groups of lock is known
as:
a. Mason Keying c. Master Keying System
b. Master Key System d. Code Lock
63. Which of these types of lock can be opened and closed remotely by electronics means?
a. Electrical lock c. Magnetic lock
b. Combination lock d. Coded lock
64. An inquiry into the character, reputation, discretion, integrity, morals and loyalty of individuals,
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

to determined person suitability for appointment or access to classified matters is known as:
a. PSI c. LAC
b. NAC d. BI
65. In industrial security, when access is limited only to authorized personnel, the area is referred
to as:
a. Restricted Area c. Visitors Area
b. Safe Area d. Detour Area
66. The Exterior and interior parallel area near the perimeter barrier of an industrial compound to
afford better observation and patrol movement is known as:
a. Protective Zone c. Clear Zone
b. Twilight Zone d. Patrol lane zone
67. A new private security agency shall be issued a temporary license to operate good for how
long?
a. 1 yr. c. 2 yrs.
b. 3 yrs. d. 6 months
68. A private Security and private detective agency may organized by any Filipino citizen or
corporation, association, partnership which how many percent owned and controlled by a Filipino
Citizen.
a. 70% c. 80%
b. 90% d. 100%
69. This is a place in an industrial where a security agency will establish its personnel
identification and checking system.
a. Control Point c. Detachment Headquarters
b. Guard House d. Branch Office
70. This is known as the weakest link in the security chain.
a. Information Security c. Personnel
b. Physical Security d. Documentary Security
71. The tenure of security personnel is based on:
a. Can be extended by the client
b. The service contract between the agency and the client
c. Tenure provided by the labor
d. Labor only contracting between agency and the guard
72. Before a private security agency renders security service to its client, there must be a contract
that must bind them is called:
a. Contract Service c. Contract of Work
b. Security Service Contract d. Security Contract
73. When was of R.A. 7641 enacted:
a October 3, 1973 c. October 3, 1972
b. January 7, 1993 d. July 13, 1969
74. An act amending article 287 of Presidential Decree No. 442 as amended, otherwise known as
the Labor Code of the Philippines.
a. R.A 7641 c. R.A 5487
b. P.D. 100 d. R.A 4176
75. This is the unit under the Philippine National Police which is charged with the supervision,
direction and control of all security agencies in the Philippines.
a. PNPSAGSD c. PNPSOSIA
b. PNPSUSIA d. PCSUSIA
76. This is single proprietorship, corporations, companies or association, duly organized and
registered with the Security Exchange Commission and /or the Department of Trade and Industry.
a. Juridical Person c. Person
b. Natural Person d. none of them
77. Mr. Makabebe established a legitimate business of providing private security and detective
services and registered this business to the SEC. What kind of business does Makabebe
established?
a. Private Security Agency c. Private Security Industry
b. Private Security Business d. Private Security Detective

78. Who issued licensed to operate?


a. Chief of Police c. PNP Chief
b. Chief SAGSD d. PNP Chief SAGSD
79. This is known as Public Security.
a. PNP SAGSD c. PNP BAGUIO
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

b. PNPCSG d. PNP
80. The one who are authorized to issue the implementing rules and regulations pertaining to
R.A. NO. 5487.
a. SAGSD c. SOSIA
b. PADPAO d. PSA
81. What G.O. is to repeat all calls from post more distant from the guardhouse where I am
station?
a. G.O. 2 c. G.O. 4
b. G.O. 6 d. G.O. 8
82. He shall not use his license and privileges to the prejudice of the public, the client or customer
and agency.
a. Ethical Standard c. Code of Conduct
b. general Order d. Security guard’s Creed
83. Whose fundamental duty is to protect lives and properties and maintained order within the
vicinity or place of duty?
a. PSA c. Security Guard
b. Private Detective d. Body Guard
84. The minimum number of directions from which each point in the area should be lighted
depending upon the use of the area.
a. Coverage Factor c. Duress Code
b. Doppler Effect d. Dry run
85. Type of code system so that security personnel when forced by armed men enter an
installation can give alarm by the use of certain words in casual conversation with other personnel
in the installation.
a. Coverage Factor c. Duress Code
b. Doppler Effect d. Dry run
86. Term applied to a device or system that in the event of failure of a component the incapacity
will be signaled.
a. Fail Safe c. Key Control
b. Inspection d. Lock
87. Defined as a mechanical, electrical, hydraulic, or electronic device to prevent entry to a building,
room, and container or hiding place.
a. Fail Safe c. Key Control
b. Inspection d. Lock
88. A term used in England for lock pickers, safecracker and penetrations of restricted rooms or
areas.
a. Protective Alarms c. Peterman
b. Restricted Area d. Security Survey
89. The maximum number of security guards that a private guards that an agency/company guard
forces may employ to include its branches.
a. 500 c. 1000
b. 200 d. 100
90. The minimum number of security guards that a private security agency may employ.
a. 200 c. 100
b. 1000 d. 500
91. The color of shirt uniform for company guards.
a. Blue c. White
b. Navy Blue d. Light Gray
92. Security services contracts between private security agencies and clients must be
______________.
a. Duly Signed c. Duly Agreed
b. Duly Authorized d. none of them
93. He operates on a covert type of mission on a specific confidential order by his agency:
a. PNP intelligence c. Military Intelligence
b. Private Detective d. Police
94. The component of communication security designed to protect transmission firm interruption,
traffic, analysis, and initiative deception.
a. Transmission Security c. Communication Security
b. Document Detective d. Deception Security
95. A conference or dialogue between the survey team and management officials of a plant
before security survey is conducted.
a. Post Conference c. Pre-conference
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

b. Entrance Conference d. Primary Conference


96. The exposure and teaching of employees on security and its relevance to their work.
a. Orientations c. Reminders
b. Cabinets d. Security Education
97. Qualified years’ experience of security consultant is:
a. 10 years c. 5 years
b. 15 years d. 20 years
98. A method, scheme, or device or their combinations that prevent, delay, or negate criminal
acts;
a. Fencing c. Dry run
b. Counter measure d. Burglar-resistive
99. This is otherwise known as the ‘’ Technical Education and Skills Development Act of
1994”.
a. R.A No. 7796 c. R.A. No. 7641
b. R.A. No. 8799 d. R.A. No. 5487
100. He was the famous author of the book entitled “The Art of War” who once said: “Know thy
enemy and know yourself, you need not fear the results of a hundred battles” “If you know
yourself and not the enemy, for every victory, you are a fool who will meet defeat in every battle.”
a. Mao Tse Tung c. Sun Tzu

b. Gautama Buddha d. Confucius

MOCK BOARD EXAMINATION IN INDUSTRIAL SECURITY


MANAGEMENT
SET A

INSTRUCTION: Select the correct answer for each of the following questions. Mark only one
answer for each item by marking the box corresponding to the letter of your choice on the answer
sheet provided. STRICTLY NO ERASURES ALLOWED. Use pencil no. 1 only.

1. In the history of military intelligence and because of his greatest contribution to the field, he
was named as the father of organized military espionage.

a. Alexander the great c. Genghis Khan


b. Moses d. Frederick the Great

2. An informant plays a very significant rule in intelligence gathering, clandestine operation and
infiltration operation. They undergo series of stages before they are finally listed or posted. Listed
below are the different stages or phases. One of the following is not under the phases of
informant activity being considered in police intelligence and secret service operation.
a. Training Phase c. Schooling Phase
b. Utilization phase d. Recruitment Phase
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

3. The phase of informant activity that includes execution of plans which are initiated after
recruitment for the disposal of an informant who is either no longer of value, or otherwise cannot
continue in an informant status.

a. Training Phase c. Termination Phase

b. Utilization phase d. Recruitment Phase

4. The following is the order of the phases of informant activity.


1. Utilization Phase
2. Recruitment Phase
3. Training Phase
4. Termination Phase

a. 1234 c. 2341

b. 3214 d. 2314

5. This continues as a separate phase of informant activity until the recruited informant
becomes productive in individual becomes productive in a specific clandestine operation.
a. Termination Phase c. Training Phase

b. Recruitment Phase d. Utilization Phase

6. An informant who initially intends to furnish only limited intelligence information will offer
supply more if properly handled.
a. True c. False

b. Doubtfully True d. Doubtfully False

7. Because of the highest level of security required to an agent handler. An intelligence


operative should always keep the following points in mind except:
a. Never use offensive terms
b. Treat informants fairly
c. Permit informant to take charge of the operation
d. Meet informant on Neural Ground

8. John furnishes regularly an intelligence information to the operatives of the military


intelligence group for a fee. What is john’s classification in the intelligence world?
a. Informer c. Informant

b. Surveillant d. Undercover

9. SPO II Mendoza assigned as Intelligence officer of one Police office of Quezon City is
working on a sensational case. What should be the first step SPO II Mendoza should do?
a. Request for funding
b. Train his former informant
c. Recruit informant for the case
d. Assigned the case to his subordinate.

10. What is the interpretation of C-1 evaluation?


a. Information comes from an unreliable source and is improbably true.
b. Information comes from an unreliable source and is probably true.
b. Information comes from a fairly reliable source and is confirmed from
other sources.
c. Information comes from a fairly reliable source and is doubtfully true.

11. When a secret agent procures information about a subject openly, he is performing
collection method
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

a. Routine c. Overt

[Link] d. Covert

12. After a military offensive operation conducted by a military operatives against the ABU
sayaf group, their commander release an information to the chief of the AFP as to the location
camp of the group, their strengths and capabilities. Under the evaluation rating. The origin of
the source is interpreted as:
a. T c. X

b. V d. Y

13. Pedro is a government employee who voluntarily gives information to police as to the
whereabouts of Mario, a suspected killer in killing of the town Mayor of Abra. Pedro as an
informant will be evaluated as:

a. Not reliable c. Fairly reliable

b. Unreliable d. Usually reliable

14. Roger is a confidential agent of the ISAFP who regularly furnishes information of the
activities of the New Peoples Army operating in Makati city. The information given by Roger to
the ISAFP will be evaluated as:

a. Possibly True c. Doubtfully True

b. Probably True d. Improbable

15. PO III Juan dela Cruz submitted an intelligence report evaluated as B-5. What is the
interpretation of this evaluated intelligence report?

a. Information is usually from a reliable source and is possible true.


b. Information is usually from a reliable source and is improbable.
c. Information is usually from a reliable source and is probably true.
d. Information is usually from a reliable source and is doubtfully true.

16. SPO IV Romeo Tan evaluated the information gathered as “completely reliable, source
probably true”. What is the information’s evaluation rating?

a. A 5 c. A 1

b. A 4 d. A 2

17. Intelligence cycle is very important in the processing of information. A sea of information is
useless if they are not processed and analyzed, what the order of the intelligence cycle is.
1. Dissemination and use
2. Processing of Information
3. Collecting of information
4. Planning of the collection effort.

a. 4231 c. 3421

b. 3241 d. 4321

18. It is an intelligence operation process divided into four phases:

a. Intelligence Cycle c. Intelligence estimate

b. Operational Cycle d. Intelligence Collection

19. It is a product resulting from collecting information concerning an actual or potential


situation and condition relating to foreign activities and to foreign or enemy held areas:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

a. Interrogation c. Intelligence

b. Information d. Investigation

20. The furnishing of Intelligence data to other police unit or other government agencies so
that they can use its important is called:

a. Distribution c. Channeling

b. Furnishing d. Dissemination

21. AIEI stands for Analysis, Integration, Evaluation and Interpretation. Its purpose is to
determine that information is:
a. True and reliable d. All of the above
b. True and accurate
c. Correct and worthwhile

22. In the intelligence cycle security. This is the most important consideration the government is
trying in the protection of an informant or agent working on an intelligence mission:
A .Financial Support c. Trustworthiness
B. .Confidentiality d. Loyalty

23. A logical and orderly examination of the intelligence factors affecting the accomplishment of
the mission:
a. Situation Map c. Intelligence Files
b .Intelligence Summary d. Intelligence Estimate

24. To plan efficient and to supervise the execution of the collection of information, an
intelligence officer must thoroughly understand the following, Except:
a. The mission of the command
b. The area of operation
c. The steps in planning and executing the collection effort.
d. The name of the informant and informer.

25. Processing of information includes recording that makes information becomes intelligence.
Among the following is the best representation of recording.

a. Situation map c. Codes

b. Letters d. Sketch

26. The intelligence officer submits a regular report consistent within itself to his commander, in
the parlance of intelligence cycle, this means –

a. Reliability c. Pertinence

b. Accuracy d. Integration

27. Raw data or information are processed and analyzed to become an intelligence information
and this will be disseminate to the end users, this refers to the activity of passing information to
another.

a. Recoding c. Reporting

b. Filing d. Processing
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

28. The best means of disseminating information use by an informant:

a. Message c. Journal

b. OB d. File

29. All evaluated information of every description including those derived from observation,
reports, rumors, imagery, and other source from which intelligence is produced; any information
gathered or received which is of intelligence interest.

A. Intelligence information c. Information

B. Investigation d. Interrogation

30. The covert observation of an area, building or stationary object in order to gain information
is called

a. Undercover works c. Roping

b. Casing d. Surveillance

31. In stationary surveillance, the following must be observed, EXCEPT:

a. Never meet the subject face to face


b. Avoid eye contact
c. Recognize fellow agent
d. If burnt out, drop subject

32. It is a circumspect inspection of place in order to determine its suitability for a particular
operational purpose.

a. Inspection c. Survey

b. Surveillance d. Casing

33. The term used for the object of surveillance is subject while the investigator conducting the
surveillance is:

a. Rabbit c. Decoy

b. Surveillant d. Target

34. When the subject identifies or obtains knowledge that the investigator is conducting a
surveillance on him, the latter is:

a. Cut out c. Burn out

b. Sold out d. Get out

35. Which of the following statement is not true?

a. The Common meaning of the word decoy is Bait.


b. The common meaning of the word decoy is Induce.
c. The common meaning of the word decoy is trap.
d. The common meaning of the word decoy is trade.

36. Roger, a suspected drug dealer noticed that he is being followed by a group of person every
time he is in town doing illegal business with some of his partner. In surveillance, this is called:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

a. Fixed Surveillance c. Tailgating

b. Moving Surveillance d. Convoy

37. It is a kind of Surveillance involving the use of scientific devices such as video camera,
telescope, video recorder and others is called:

a. Mustard Plaster surveillance


b. Stakeout Surveillance
c. Technical Surveillance
d. Intermittent Surveillance

38.. The type of undercover operation wherein techniques are applies for longer time and is
considered as the most different investigative activity yet the most rewarding.
a. Casing c. Undercover Operation

b. Penetration d. Surveillance

39.. What type of cover uses an actual or a true background?


a .Artificial Cover c. Natural Cover
b. Multiple Cover d. Cover with cover

40. The type of cover using biographical data adopted for a fictitious purpose.
[Link] cover c. Cover with cover
b,Artificial cover d. Multiple cover

41. Cover operation is a sophisticated activity, it needs a good intelligence operative to be


successful in the mission. One of the following is not a requirement of a Cover.
a. It must provide freedom from movement
b. It must protect the operatives from compromise
c. It must be sufficiently flexible to meet changes in the situation
d. It must be technologically updated

42. This happen when operatives operate by minimal interference from outside elements like
posting as a waiter in a restaurant during a buy bust operation.

a. Undercover assignment c. Penetration Agent

b. Cover assignment d. Insider

43. Pedro is a thief who is eyeing at the handbag of Maria. POI Santos Reyes is standing a few
meters from Maria. The thief’s desire to steal is not diminished by the presence of the police
officer but the ____ for successful theft is there.

a. Ambition c. Intention

b. Felling d. Opportunity

44. Henry, a CIA agent sneaks into a building and steal information in the Iranian embassy, his
operation was compromised. If you are the agent handler what will be your advice to Henry.

a. Do nothing c. Surrender

b. Move out immediately d. Contact their informants

45. In cover and undercover operation, Intelligence can and should do nothing more than
.
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

a. Promote better police citizen interaction


b. Enhance the probability of accuracy in report writing
c. Improve administrative efficiency particularly in recruitment and selection
d. Increase the number of arrest of criminal syndicate members

[Link] service requires rigid secrecy in its operation, In the debriefing, the intelligence
agent is asked to discuss which of the following:

a. His educational profile and school attended


b. His personal circumstances such as his age, religious affiliation, address, etc.
c. His political inclination and or party affiliation
d. His observations and experiences in the intelligence function.

47. Agents work for us as ____ works for them.

a. Counter Agent d. Double Agents


b. Spies
c. Defector –in – place

48. The most important purpose of counter intelligence in the existence of a police
office.

a. Defend the police office c. Give reports

b. Promote the police office d. Release information

49. It is a type of counter-intelligence measure designed to ensure safeguarding of


information.

a. Denial Measure c. Deception Measure

b. Detection Measure d. Preventive Measure

50. Pedro, an intelligence operative conducted survey or close examination of a


suspected building believed to be the hideout of an outside element. What is the
intelligence activity of Pedro?
a. Counter intelligence c. Survey

b. Surveillance d. Reconnaissance

51. When an intelligence operative adopts personnel security investigation process in


their police work, what measure is this in counter intelligence?

a. Denial Measure c. Deception Measure

b. Detection Measure d. Preventive Measure


52. PO 1 Jester Dela Cruz was able to conceal information which he gathered from his
informants and informers, his success in concealing the information is known in counter
intelligence as:
a. Passive-defensive c. Active-passive defensive

b. Active-defensive d. Defensive-offensive

53. If camouflage is a method of hiding people or things by disguising them or covering


them so as to look like the surroundings then ______ is the hiding or keeping things.

a. Hideout c. concealment
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

b. Cover d. Safe house

54. Counter intelligence often requires a defensive action. One of the following is not a
counter intelligence activity.

a. Knowing the clandestine operations of the enemy


b. Application of counter-intelligence operations to avoid enemy activities.
c. Containment of enemy activities.
d. Releasing intelligence information.

55. The common failures of counter-intelligence operation.

a. Recruitment
b. Many informers or informants
c. Leak information
d. Too many intelligence operatives

56. An inquiry into the character, reputation, discretion as loyalty of a person in order
to determine a person’s suitability or access to classified matter prior to the granting of
security clearance.

a. Complete Background Investigation (CBI)


b. Partial Background Investigation (PBI)
c. Background Investigation (BI)
d. Personnel Security Investigation (PSI)

57. Document information was supplied by the Regional Office of the National Bureau
of Investigation in response to an inquiry of a Police Intelligence Unit. The said
document will be treated as a record coming from:

a. Local Agency Check c. International Agency Check

b. National Agency Check d. Local Clearance Check

58. X is an intelligence agent conducting personnel security investigation as to the


assets and liabilities of Y, a cabinet secretary of the President of the Philippines. X to
be successful in his inquiry against Y, he should check the _________ of Y.

a. Criminal Records c. Foreign Travel records

b. Credit Records d. Employment Records

59. The best document to check the identity of a criminal in the country.

a. Barangay Clearance c. Marriage Certificate

b. Court Clearance d. NBI Clearance


60. The weakest link in the intelligence operation because they are susceptible to
temptations and corruptions.
a. Informer or informant c. A and B

b. Police operatives d. None of the above

61. This refers to the entire inspection of a place in order to determine the
vulnerabilities and criticalities of the place related to intelligence interest.

a. Security Survey c. surveillance

b. Casing d. Reconnaissance

62. Security survey and investigation is generally conducted because of the following
objectives except:
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

a. To evaluate the place c. For future plan

b. For future mission d. Releasing information

63. PO 1 Jester Dela Cruz was assigned to conduct security survey of a proposed safe house
of intelligence operatives, he should recommend a place that is:

a. An inhabited place c. Near the city

b. Away from the city d. basement of a police


office

64. The most important aspect of security survey and investigation related to the inspection of
an entire facility of an intelligence interest.

a. Analysis c. Evaluation

b. Walk through d. Recommendation

65. A continuous and systematic program designed to meet the security needs of an
intelligence office or unit in a police office.

a. Security indoctrination c. Security consciousness

b. Security Reminders d. Security programs

66. Security orientation is the initial briefings of intelligence operatives regarding their mission;
whereas is selling others

a. Security indoctrination c. Security consciousness

b. Security Reminders d. Security promotion

67. An intelligence operatives or agents during his security survey was “burned out” this
means:
a. The agent/operative was fired
b. The agent/operative was identified and known
c. The agent/operative was suspected of being a double agent.
d. The agent/operative was ineffective.

68. Which is the best source of information on criminal, criminal activities, and even subversive
group when conducting security survey investigation?

a. Cooperative members of the community


b. The “tanods” of the barangay
c. Ex-Convicts
d. News Publisher

69. When investigating a place suspected of doing illegal activity, the operatives should always
consider :

a. The name of the place c. who visits the place

b. Location of the place d. the business operation of the place


70. The security phase of intelligence covering all the activities devoted to destroying the
effectiveness of inimical adverse intelligence activities and the protection of information against
espionage, personnel against subversion and installation against sabotage.

a. Police intelligence c. Counter intelligence

b. combat intelligence d. Military intelligence


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

71. The weakness which make it susceptible to any action which reduces its fighting potentials.

[Link] c. Vulnerability

[Link] d. Adaptations

72. Related to Information and materials released by any government office, the
unauthorized disclosure of which would cause exceptionally grave damage to the nation,
politically, economically or military.

a. Restricted c. Confidential

b. Top Secret d. Secret

73. Under the documents and information security guidelines. Who is authorized to classify
top secret matter?

[Link] of Police c. Regional Director

[Link] of DND d. Provincial Director

74. It is a system in which individual letters of a message are represented.

[Link] c. cryptogram

[Link] d. cryptography

75. The requirement that the dissemination of classified matters be limited strictly to those
persons who are police officials.

[Link] matters c. Need to know

[Link] to security d. none of the above

76. A document classified in nature or unclassified, compiled and published before it will be
disposed should be shredded and burned, this action is always taken into consideration because
if the document is not properly disposed then it will compromise any operation of the intelligence
unit. This is because
.
a. It is a matter of national interest
b. It requires highest level of security
c. It is a rule
d. It is a practice

77. The Information and material whose unauthorized disclosure would endanger national
security, cause serious injury to the interest and prestige of nation.

a. Secret
b. Security
c. Confidential
d. Plan

78. The information and material that require special protection other than determined to be
top secret.

a. Confidential
b. Intelligence
c. Records
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

d. Restricted

79. The Burning or pulping of classified or unclassified documents by a custodian done in


the presence or witness who is cleared for the top secret.

a. Destruction
b. Destroy
c. Storage
d. None of the above

80. The original classification for assignment of top secret categories exclusively rest with the
head of the department.
a. True c. Either
b. False d. Neither

81. The changing of the classification of classified matter to category higher than that
previously assigned to it.

[Link]
[Link] [Link]

[Link]

82. Is an object which has been placed into orbit by human endeavor use to monitor
activities in the earth.

[Link]
[Link] [Link] Tower
[Link]

83. Alex is an Intelligence operative working on a prostitution case. He frequents himself


in different disco pubs. What should be the best equipment he should use to monitor any
prostitution activities?

[Link] [Link]

[Link] [Link] Recorder

84. Police Inspector R. Mustang, was assigned as a City Director of the Western Police
District. Many of the intelligence operations information of the police office leaked to
outside elements. What should police inspector R. Mustang do to avoid future repetition
of leak information in his area of responsibility?

[Link] very strict


[Link] contacts to his policemen
[Link] technological equipments to monitor activities in the police office
[Link] his informer

85. It is consider the best equipment in counter- intelligence operations as far as air and
maritime surveillance is concerned.

[Link] [Link] Recorder


[Link] – camera [Link]

86. Under R.A. 4200 otherwise known as the anti-wire tapping law prohibits the
following, except:

[Link] any wire or cable


[Link] posses any tape record
SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

[Link] permit other people to tap or cause to be done


[Link] in the wire tapping act

87. The FBI was tapping the phone line of the suspected spy"; "Is this hotel room bugged"
wiretap, bug, tap or eavesdrop?
a. Yes d. Either
b. No
c. Neither

88. Wire tap is a concealed listening or recording device connected to a communications


circuit, while _____ is an electronic listening device, such as a hidden microphone or
wiretap, used in surveillance.

[Link] [Link] in

[Link] [Link]

89. Pedro went close to the door of the office of the chief of police purposely to hear
communication between the chief and his visitor. Pedro is in the act of ____.

[Link]
[Link]
c. Listen in
[Link]

90. The controversial “hello Garci case” is a classic example of:


[Link] tapping [Link]
[Link] [Link] in

91. Mr. James is an alien, who assisted Mr. Dela Cruz a Filipino Citizen in tapping the
communications between his general manager and client regarding an illegal business
transaction, if Mr. James will be convicted of violating R.A. no. 4200 what is his possible
penalty?
a) 12 years c. Disqualification from public office

b) Life imprisonment d. Subject to deportation proceedings

92. One of the following is not a device or equipment used to secretly overhear intercept or
records information or spoken word.

a) Dictaphone c. Walkie Talky

b) Dictagraph d. Wire or Cable

93. Considered the best weapon system of terrorist because of its impact and damage to the
populace.

a) Anthrax Delivering c. Massacre of a group

b) Bombing d. Hostage Taking

94. How are coded messages converted to intelligence language?

a. Encoding c. Processing

b. Labeling d. Decoding

95. It is otherwise known as the Anti-terrorism Law of the Country.

a) The Human Security Act.


SCHOOL OF CRIMINAL JUSTICE AND PUBLIC SAFETY
General Luna Road, Baguio City Philippines 2600

Telefax No.: (074) 442-3071 Website: [Link] E-mail Address: ub@[Link]

b) The International Law on


Terrorism d) None of the above
c) The Anti-Terror Bill

96. This distinguished from other acts of violence, civil disturbance and from war is:

a. Terrorist c. Extremism

b. Terorism d. Terorista

97. Juan is a member of a high school fraternity terrorizing students and creating fear
among the whole students. Is the act of “Juan” constitute terrorism?

a) True c. False

b) Doubtfully True d. Doubtfully False

98. One of the following act is not included in a crime of terrorism as punished under R.A.
9372.
a) Murder c. Kidnapping

b) Rebellion or Insurrection d. Bombing

99. X, with intent to kill Y who is inside the restaurant suddenly throw a hand grenade killing Y
instantly and killing and injuring at least more than ten people in the spot. Is the act of X
constituting a crime of terrorism?

a) True c. Either

b) False d. Neither
100. This is single proprietorship, corporations, companies or association, duly organized and
registered with the Security Exchange Commission and /or the Department of Trade and Industry.
a. Juridical Person c. Person
b. Natural Person d. none of them

You might also like