A) B. Standardization of post duties B) D. Rotation of personnel C) C. Compliance to service contract obligations D) A. Optimization of manpower
A) A. A manager assigns guards based on seniority B) C. A manager focuses on surveillance only C) B. A manager integrates security protocols with disaster preparedness plans D) D. A manager limits guard functions to access control
A) B. A mechanic adjusting tools for faster repair B) A. A doctor maintaining continuous medical education C) D. A farmer changing planting schedules D) C. A clerk following old company rules
A) D. Encouraging more commercial licenses B) B. Elevating security management to a recognized profession C) A. Promoting security as mere enforcement D) C. Restricting entry into the field of private protection
A) D. Participation in PNP-SOSIA certification B) B. Seminar on modern threat response C) A. Annual re-training of guards D) C. Renewal of license without retraining
A) C. Managerial discretion in deployment B) B. Operational flexibility of agencies C) D. Training exemption clause D) A. Professional regulation and accountability
A) D. Limiting the scope of internal audits B) B. Implementing continuing professional development and ethics training C) C. Outsourcing background checks D) A. Reducing the guard-to-client ratio
A) A. The Labor Code is to employment B) C. The Penal Code is to punishment C) B. The Civil Code is to property D) D. The NBI Charter is to investigation
A) D. It reduces administrative load B) B. It aligns with practical field operations C) A. It violates regulatory competence standards D) C. It promotes efficient manpower use
A) A. Reduced turnover due to higher wages B) B. Consistent adherence to competency-based performance standards C) C. Increase in unregistered security firms D) D. Decrease in security awareness training
A) D. Corporate sustainability B) C. Institutional autonomy C) B. Ethical accountability D) A. Efficiency in operations
A) C. Fiscal accountability B) D. Administrative discretion C) A. Delegation of authority D) B. Regulatory compliance in operational management
A) B. A barangay tanod acting as a police auxiliary B) D. A corporate lawyer bound by IBP ethics C) A. A private nurse working under DOH regulation D) C. A private bank following BSP risk assessment
A) C. The ratio of guards to clients B) B. The consistency of security actions with ethical standards C) D. The frequency of policy updates D) A. The number of personnel trained annually
A) A. Security firms competing for higher pay rates B) B. Guards exercising discretion guided by legal standards C) D. Agencies avoiding government audits D) C. Managers outsourcing training programs
A) b) To provide guidelines for professional conduct and integrity B) d) To promote competition among professionals C) a) To ensure professionals earn a high income D) c) To limit the number of professionals in a specific field
A) d) To ignore the PRBs B) c) To compete with the PRBs C) b) To provide funding for the PRBs D) a) To supervise and control the PRBs
A) d) Guaranteeing employment for all professionals B) a) Implementing rigorous licensure examinations C) c) Encouraging research and innovation in professional fields D) b) Mandating Continuing Professional Development (CPD)
A) d) To limit the scope of practice for professionals B) a) To make it easier for professionals to find jobs C) c) To reduce the cost of professional services D) b) To ensure professionals meet global benchmarks and can compete internationally
A) c) Enhanced quality and safety of professional services B) b) Higher prices for professional services C) d) Reduced access to professional services D) a) Increased taxes for the public
A) A. Regulatory compliance B) C. Ethical governance C) B. Administrative coordination D) D. Operational discretion
A) C. Expand the jurisdiction of the PNP B) A. Reduce the cost of agency operations C) D. Allow private security to act as quasi-police forces D) B. Ensure standardized training and accountability
A) C. Uphold the law despite business pressure B) A. Report the company to DTI C) B. Refuse compliance and justify business necessity D) D. Wait for formal complaint before acting
A) B. Integration of competence and accountability B) D. Centralized command approach C) C. Profit-driven motivation D) A. Efficiency over legality
A) C. Professional autonomy and responsibility B) B. Managerial compliance C) A. Ethical minimalism D) D. Administrative hierarchy
A) D. A guard prioritizes rules over empathy B) C. A guard detains a customer for minor inconvenience C) B. A guard de-escalates a confrontation through calm communication D) A. A guard ignores customer concerns to maintain discipline
A) C. Involves court procedures B) B. Aims to anticipate threats for decision-making C) D. Deals only with insider theft D) A. Focuses on criminal liability
A) D. Failure of situational awareness B) B. Coordination of customer relations with safety protoco C) C. Overstepping of duties D) A. Violation of safety ethics
A) A. Assertive body language B) B. Emotional intelligence and restraint C) C. Verbal dominance D) D. Physical authority
A) A. Detecting minor violations B) C. Focusing on post-crime reporting C) D. Collecting data without analysis D) B. Predicting business risks through information synthesis
A) D. Defensive compliance to avoid escalation B) C. Strict enforcement without compromise C) A. Command presence over customers D) B. Customer-centred communication and conflict de-escalation
A) D. Emergency command protocol B) A. Reporting chain of command C) C. Safety communication ethics D) B. Preventive risk escalation
A) B. Operational discipline B) A. Uniform compliance C) D. Administrative reporting D) C. Personal safety and incident prevention
A) A. Acceptable prioritization since VIPs are high-value clients B) D. Proper since client satisfaction is primary in service delivery C) C. Logistically correct because VIPs move faster and clear exits sooner D) B. Violates impartiality and universal duty of care in emergency protocol
A) A. Discontinue the new greeting to restore speed B) C. Reassess workflow to integrate courtesy without compromising readiness C) B. Continue the policy without modification D) D. Enforce stricter penalties for slow response times
A) c) Integrate comprehensive customer service training, including active listening and empathy, into the security team's ongoing professional development. B) b) Implement a zero-tolerance policy for complaints against security personne C) a) Replace the entire security team with personnel from a customer service background. D) d) Reduce the security team's interaction with customers to minimize potential conflicts
A) b) A balanced diet and regular exercise. B) c) A first-aid kit. C) a) A stylish outfit. D) d) A comfortable chair
A) d) Implement stricter, more complex security protocols to deter future breaches, regardless of the impact on productivity B) c) Conduct a thorough review of existing security protocols, identify areas of unnecessary friction, and implement user-friendly alternatives while reinforcing security awareness training. C) a) Immediately terminate all employees who bypassed security protocols. D) b) Ignore the breaches to avoid disrupting employee morale and productivity.
A) c) A combination of reduced security incidents, improved employee awareness scores, and positive customer feedback on security interactions B) b) The amount of money spent on security technology and personnel C) d) The number of security certifications held by security personnel. D) a) The number of security drills conducted per year.
A) c) Discreetly approach the individual, politely inquire about their identity and purpose, and verify the validity of the keycard B) a) Immediately alert all security personnel and initiate a lockdown of the facility C) b) Ignore the situation unless the individual successfully gains access to the restricted area. D) d) Publicly confront the individual and demand an explanation in front of other employees and visitors.
A) B. Surveillance techniques B) C. Legal procedures C) A. Customer relations and crisis communication D) D. Firearms proficiency
A) A. Poor information integration B) B. Excessive procedural compliance C) D. Lack of physical deterrence D) C. Overreliance on electronic systems
A) A. detection B) B. discipline C) C. deterrence D) D. cooperation
A) C. Frequency of drills B) A. Reduction in incident recurrence after implementation C) D. Cost of materials used D) B. Number of employees trained
A) D. Focus solely on surveillance hardware B) A. Integrate human relations training with corporate intelligence modules C) B. Replace personnel with IT-based monitoring D) C. Isolate intelligence from guest operations
A) A. Allow entry to avoid conflict, since the visitor claims VIP status. B) B. Call for backup immediately and confront the visitor in a firm tone C) C. Maintain composure, explain the protocol’s importance in a respectful manner, and discreetly verify with superiors if exceptions apply. D) D. Deny entry outright and warn the visitor that noncompliance is a violation
A) B. Conduct discreet surveillance and document patterns before informing management B) D. Ignore the activity until concrete proof of data theft is found. C) C. Immediately suspend the employee pending investigation. D) A. Publicly confront the employee to make an example for others.
A) B. Operational discipline B) C. Corporate flexibility C) A. Convenience of service D) D. Conflict prevention
A) C. Conduct a debriefing to identify behavioral gaps and emphasize real-world implications of non-compliance. B) B. Submit a report and recommend termination for those who disobey. C) A. Penalize all non-participants immediately D) D. Repeat the drill without feedback to ensure familiarity
A) C. Unethical because it violates privacy rights and due process, regardless of motive. B) B. Acceptable if done discreetly. C) A. Acceptable if it prevents corporate loss. D) D. Justifiable only if ordered by management.
A) C. Interview employees first, then design new policies without physical inspection. B) B. Begin with site observation, followed by data gathering, risk identification, and recommendation of layered security measures. C) D. Draft security protocols immediately without environmental scanning. D) A. Conduct risk assessment only after incidents occur
A) D. Permissible if incidents are infrequent. B) C. Efficient because it saves manpower resources. C) B. Risky because technological reliance reduces deterrence and real-time response D) A. Acceptable since technology can replace manpower
A) C. Recording all incidents B) A. Responding to emergencies C) B. Controlling and mitigating identified threats D) D. Recruiting qualified guards
A) A. Strengthen digital access control and implement strict data classification protocols. B) C. Restrict all email communications without policy review. C) B. Dismiss the employee immediately to set an example. D) D. Increase surveillance on all staff computers without consent.
A) A. Emergency response readiness B) D. Insurance claim processing C) C. Strategic redundancy and recovery implementation D) B. Facility evacuation procedures
A) B. Developing an incident response plan B) D. Conducting employee drills C) A. Hiring additional guards D) C. Installing more lighting
A) B. Trust and reliability B) A. Access credentials C) C. Firewalls and passwords D) D. Corporate image
A) A. Reactive and segment B) D. Defensive and passive C) B. Proactive and integrative D) C. Procedural and limited
A) A. Security audit B) B. Risk quantification C) D. Loss estimation D) C. Threat profiling
A) C. Plan and rehearsal B) D. Fire and extinguisher C) A. Lock and key D) B. Cause and effect
A) D. Overdelegation of duties B) A. Lack of dynamic threat simulation C) C. Too much documentation D) B. Excessive focus on fire safety
A) A. Data confidentiality B) C. Asset visibility C) B. Access control D) D. Guard rotation
A) B. Immediate employee retraining B) C. Acquisition of insurance policy only C) D. Hiring external auditors post-crisis D) A. Rapid operational recovery despite facility damage
A) C. Interviewing random employees only B) D. Writing a generic safety report C) B. Listing all available equipment D) A. Linking identified vulnerabilities with risk probability and consequence
A) B. Supervisor preference B) A. Cost-benefit ratio versus threat likelihood C) C. Client demand D) D. Legal documentation alone
A) c) Assessing the external threats and vulnerabilities of the new location. B) d) Interviewing all employees to gather their security concerns. C) a) Installing the latest security technology. D) b) Reviewing the company’s existing security policies and procedures.
A) b) A detailed passenger manifest. B) d) A fully stocked galley. C) c) A well-trained crew following emergency protocols D) a) A fresh coat of paint.
A) b) Implement stricter penalties for employees who violate data security policies B) c) Conduct a comprehensive risk assessment, update document and information security protocols, and provide regular training to employees on data protection best practices. C) a) Increase the budget for cybersecurity software. D) d) Hire more IT personnel to monitor network traffic
A) c) A combination of reduced security incidents, successful perimeter breach attempts, and employee feedback on safety perceptions. B) b) The number of security guards patrolling the facility. C) d) The amount of money spent on physical security equipment and personnel D) a) The number of security cameras installed on the premises
A) a) Immediately reject the applicant without further consideration. B) d) Publicly confront the applicant and demand an explanation for the misrepresentation. C) c) Conduct a thorough investigation to verify the accuracy of the applicant’s information and assess the potential risk to the organization. D) b) Ignore the discrepancy if the applicant is otherwise qualified
A) B. Surveillance compensates for procedural lapses B) D. The tailgating issue is minor since no breach has yet occurred. C) C. The human element in access control weakens an otherwise strong system D) A.Physical security measures are effective and sufficient.
A) A. Technology dependence versus manpower redundancy B) B. Physical barrier design versus emergency evacuation speed C) D. Legal compliance versus administrative convenience D) C. Budget allocation versus client perception
A) D. Archival accessibility B) B. Confidentiality and integrity assurance C) C. Data digitization accuracy D) A. Records retrieval efficiency
A) C. Efficient communication outweighs minor risk B) D. Minor issue if files are later deleted C) A. Acceptable since recipients are authorized D) B. Violation of confidentiality principle due to insecure transmission medium
A) A. Failure of physical access control B) D. Inadequate visitor management procedures C) C. Ineffective background investigation D) B. Overemphasis on perimeter defense, neglecting information security policy
A) A. Creating a centralized business district to encourage economic growth B) B. Installing CCTV cameras at every street corner to reduce crime C) D. Promoting walkable streets to enhance community interaction D) C. Zoning residential areas with clear boundaries and layered access control
A) D. The use of modern materials prone to forced entry B) C. Overcrowding of retail shops limiting natural surveillance C) B. Excessive transparency in façade design reducing perceived control D) A. Absence of defensive architecture like bollards
A) C. Virtue Ethics – Green areas reflect the moral character of urban developers B) A. Deontological – Urban greenery is a duty of the government regardless of outcomes C) D. Social Contract – Citizens must follow rules set by planners who include greenspaces D) B. Utilitarian – Urban greenspaces reduce crime and promote overall public well- being
A) B. Narrow alleyways with overhead motion sensors B) C. Mixed-use developments with passive surveillance and active frontage C) D. Isolated parks with hidden CCTV systems D) A. High steel perimeter fencing with monitored gates
A) A. Development A is more secure due to limited access and high boundary protection. B) B. Development B poses higher security risk due to permeability and openness C) C. Development B fosters natural surveillance and community ownership, making it more resilient. D) D. Development A exemplifies CPTED by reducing opportunities for observation by outsiders.
A) D. It can be justified if CCTV coverage is installed B) C. It aligns with traditional architectural philosophy. C) B. It violates basic environmental design principles by increasing opportunities for concealment and crime. D) A. It optimizes business space and should proceed.
A) B. Function and resilience must harmonize with design — security and safety are integral, not decorative B) C. Security can be an afterthought once design is complete. C) D. Architects are solely responsible for aesthetic integrity, not safety measures. D) A. Form should always follow aesthetics.
A) C. Relying on mechanical security systems B) A. Enforcement of zoning laws C) B. Empowering occupants to control territorial space D) D. Reducing architectural costs
A) A. Security should rely solely on advanced technology. B) D. Community programs are outdated in modern cities C) B. Overreliance on surveillance undermines human-centered, layered defense principles D) C. Automation guarantees total safety
A) D. Architectural design has no ethical impact on security management. B) B. Human behavior is unpredictable, so only technology ensures safety. C) A. Security policies should adapt to physical limitations. D) C. Effective safety is achieved when design minimizes human error and supports policy compliance.
A) D. Passive surveillance B) B. Crime prevention through environmental design (CPTED) C) C. Reactive defense D) A. Psychological deterrence
A) B. Efficiency B) D. Safety C) A. Comfort D) C. Discipline
A) B. Target hardening B) A. Human factor engineering C) C. Natural surveillance D) C. Natural surveillance
A) B. Environmental Criminology B) C. Broken Windows Theory C) A. Rational Choice Theory D) D. Social Learning Theory
A) A. Checking building aesthetics B) D. Measuring employee satisfaction C) C. Estimating construction cost D) B. Assessing how structure supports prevention
A) D. Territorial Reinforcement B) A. Target Hardening C) B. Defensible Space D) C. Natural Surveillance
A) C. Human-Centered Design B) A. Environmental Aesthetics C) B. Access Control D) D. Symbolic Security
A) A. Territoriality B) D. Security Zoning C) B. Natural Surveillance D) C. Defensible Space
A) C. Environmental Deterrence B) A. Human-Centered Security Design C) D. Situational Hardening D) B. Symbolic Architecture
A) D. Rational Choice Theory B) A. CPTED C) B. Routine Activity Theory D) C. Broken Windows Theory
A) b) Increasing police patrols and installing surveillance cameras throughout the park. B) a) Installing high fences around the park and limiting access to daylight hours. C) d) Redesigning the park to include clear sightlines, well-maintained landscaping, community gardens, and designated activity areas to encourage legitimate use and natural surveillance. D) c) Removing all vegetation to eliminate hiding places and installing bright, glaring lights.
A) c) Relying solely on a highly trained security force to patrol the building and monitor visitor access. B) a) Creating a fortress-like structure with minimal windows and a single, heavily guarded entrance. C) b) Implementing a series of increasingly restrictive security measures, starting with a welcoming public lobby and progressing to controlled access points for sensitive areas, utilizing technology like biometrics and smart cards D) d) Eliminating all public access and conducting all business remotely.
A) b) An increase in serious crime rates. B) d) A decline in community engagement and social cohesion. C) c) Over-policing and discriminatory practices in marginalized communities. D) a) A decrease in property values in low-income neighborhoods
A) c) Utilizing a combination of reinforced display cases with advanced sensors, layered access control systems, real-time video analytics, and strategically placed architectural barriers to deter and detect potential threats. B) a) Storing all artifacts in a single, highly secure vault with limited access. C) d) Purchasing insurance policies to cover the potential loss of artifacts D) b) Displaying artifacts in glass cases with basic alarms and relying on security guards to monitor the exhibits
A) c) Implementing strict curfews and loitering laws B) d) Separating residential areas from commercial zones to educe crime. C) a) Installing surveillance cameras on every street corner D) b) Encouraging a vibrant mix of land uses and pedestrian activity to create a safer and more engaging public realm |