A) C. Compliance to service contract obligations B) D. Rotation of personnel C) B. Standardization of post duties D) A. Optimization of manpower
A) A. A manager assigns guards based on seniority B) D. A manager limits guard functions to access control C) B. A manager integrates security protocols with disaster preparedness plans D) C. A manager focuses on surveillance only
A) B. A mechanic adjusting tools for faster repair B) C. A clerk following old company rules C) D. A farmer changing planting schedules D) A. A doctor maintaining continuous medical education
A) D. Encouraging more commercial licenses B) B. Elevating security management to a recognized profession C) C. Restricting entry into the field of private protection D) A. Promoting security as mere enforcement
A) B. Seminar on modern threat response B) A. Annual re-training of guards C) D. Participation in PNP-SOSIA certification D) C. Renewal of license without retraining
A) A. Professional regulation and accountability B) B. Operational flexibility of agencies C) C. Managerial discretion in deployment D) D. Training exemption clause
A) B. Implementing continuing professional development and ethics training B) D. Limiting the scope of internal audits C) A. Reducing the guard-to-client ratio D) C. Outsourcing background checks
A) C. The Penal Code is to punishment B) D. The NBI Charter is to investigation C) B. The Civil Code is to property D) A. The Labor Code is to employment
A) D. It reduces administrative load B) B. It aligns with practical field operations C) A. It violates regulatory competence standards D) C. It promotes efficient manpower use
A) A. Reduced turnover due to higher wages B) C. Increase in unregistered security firms C) D. Decrease in security awareness training D) B. Consistent adherence to competency-based performance standards
A) C. Institutional autonomy B) A. Efficiency in operations C) D. Corporate sustainability D) B. Ethical accountability
A) A. Delegation of authority B) D. Administrative discretion C) B. Regulatory compliance in operational management D) C. Fiscal accountability
A) B. A barangay tanod acting as a police auxiliary B) D. A corporate lawyer bound by IBP ethics C) A. A private nurse working under DOH regulation D) C. A private bank following BSP risk assessment
A) B. The consistency of security actions with ethical standards B) A. The number of personnel trained annually C) D. The frequency of policy updates D) C. The ratio of guards to clients
A) A. Security firms competing for higher pay rates B) B. Guards exercising discretion guided by legal standards C) C. Managers outsourcing training programs D) D. Agencies avoiding government audits
A) b) To provide guidelines for professional conduct and integrity B) a) To ensure professionals earn a high income C) d) To promote competition among professionals D) c) To limit the number of professionals in a specific field
A) c) To compete with the PRBs B) b) To provide funding for the PRBs C) d) To ignore the PRBs D) a) To supervise and control the PRBs
A) c) Encouraging research and innovation in professional fields B) d) Guaranteeing employment for all professionals C) b) Mandating Continuing Professional Development (CPD) D) a) Implementing rigorous licensure examinations
A) d) To limit the scope of practice for professionals B) b) To ensure professionals meet global benchmarks and can compete internationally C) c) To reduce the cost of professional services D) a) To make it easier for professionals to find jobs
A) b) Higher prices for professional services B) d) Reduced access to professional services C) c) Enhanced quality and safety of professional services D) a) Increased taxes for the public
A) D. Operational discretion B) A. Regulatory compliance C) C. Ethical governance D) B. Administrative coordination
A) A. Reduce the cost of agency operations B) B. Ensure standardized training and accountability C) C. Expand the jurisdiction of the PNP D) D. Allow private security to act as quasi-police forces
A) A. Report the company to DTI B) C. Uphold the law despite business pressure C) D. Wait for formal complaint before acting D) B. Refuse compliance and justify business necessity
A) B. Integration of competence and accountability B) C. Profit-driven motivation C) A. Efficiency over legality D) D. Centralized command approach
A) A. Ethical minimalism B) B. Managerial compliance C) C. Professional autonomy and responsibility D) D. Administrative hierarchy
A) B. A guard de-escalates a confrontation through calm communication B) A. A guard ignores customer concerns to maintain discipline C) D. A guard prioritizes rules over empathy D) C. A guard detains a customer for minor inconvenience
A) B. Aims to anticipate threats for decision-making B) D. Deals only with insider theft C) C. Involves court procedures D) A. Focuses on criminal liability
A) D. Failure of situational awareness B) C. Overstepping of duties C) B. Coordination of customer relations with safety protoco D) A. Violation of safety ethics
A) D. Physical authority B) C. Verbal dominance C) A. Assertive body language D) B. Emotional intelligence and restraint
A) C. Focusing on post-crime reporting B) B. Predicting business risks through information synthesis C) A. Detecting minor violations D) D. Collecting data without analysis
A) C. Strict enforcement without compromise B) D. Defensive compliance to avoid escalation C) B. Customer-centred communication and conflict de-escalation D) A. Command presence over customers
A) A. Reporting chain of command B) B. Preventive risk escalation C) C. Safety communication ethics D) D. Emergency command protocol
A) C. Personal safety and incident prevention B) A. Uniform compliance C) B. Operational discipline D) D. Administrative reporting
A) B. Violates impartiality and universal duty of care in emergency protocol B) C. Logistically correct because VIPs move faster and clear exits sooner C) A. Acceptable prioritization since VIPs are high-value clients D) D. Proper since client satisfaction is primary in service delivery
A) D. Enforce stricter penalties for slow response times B) C. Reassess workflow to integrate courtesy without compromising readiness C) B. Continue the policy without modification D) A. Discontinue the new greeting to restore speed
A) d) Reduce the security team's interaction with customers to minimize potential conflicts B) a) Replace the entire security team with personnel from a customer service background. C) b) Implement a zero-tolerance policy for complaints against security personne D) c) Integrate comprehensive customer service training, including active listening and empathy, into the security team's ongoing professional development.
A) d) A comfortable chair B) a) A stylish outfit. C) c) A first-aid kit. D) b) A balanced diet and regular exercise.
A) b) Ignore the breaches to avoid disrupting employee morale and productivity. B) a) Immediately terminate all employees who bypassed security protocols. C) c) Conduct a thorough review of existing security protocols, identify areas of unnecessary friction, and implement user-friendly alternatives while reinforcing security awareness training. D) d) Implement stricter, more complex security protocols to deter future breaches, regardless of the impact on productivity
A) a) The number of security drills conducted per year. B) c) A combination of reduced security incidents, improved employee awareness scores, and positive customer feedback on security interactions C) b) The amount of money spent on security technology and personnel D) d) The number of security certifications held by security personnel.
A) a) Immediately alert all security personnel and initiate a lockdown of the facility B) c) Discreetly approach the individual, politely inquire about their identity and purpose, and verify the validity of the keycard C) b) Ignore the situation unless the individual successfully gains access to the restricted area. D) d) Publicly confront the individual and demand an explanation in front of other employees and visitors.
A) D. Firearms proficiency B) B. Surveillance techniques C) A. Customer relations and crisis communication D) C. Legal procedures
A) C. Overreliance on electronic systems B) D. Lack of physical deterrence C) A. Poor information integration D) B. Excessive procedural compliance
A) C. deterrence B) D. cooperation C) B. discipline D) A. detection
A) C. Frequency of drills B) D. Cost of materials used C) B. Number of employees trained D) A. Reduction in incident recurrence after implementation
A) D. Focus solely on surveillance hardware B) B. Replace personnel with IT-based monitoring C) A. Integrate human relations training with corporate intelligence modules D) C. Isolate intelligence from guest operations
A) B. Call for backup immediately and confront the visitor in a firm tone B) C. Maintain composure, explain the protocol’s importance in a respectful manner, and discreetly verify with superiors if exceptions apply. C) A. Allow entry to avoid conflict, since the visitor claims VIP status. D) D. Deny entry outright and warn the visitor that noncompliance is a violation
A) B. Conduct discreet surveillance and document patterns before informing management B) A. Publicly confront the employee to make an example for others. C) D. Ignore the activity until concrete proof of data theft is found. D) C. Immediately suspend the employee pending investigation.
A) D. Conflict prevention B) A. Convenience of service C) B. Operational discipline D) C. Corporate flexibility
A) C. Conduct a debriefing to identify behavioral gaps and emphasize real-world implications of non-compliance. B) D. Repeat the drill without feedback to ensure familiarity C) B. Submit a report and recommend termination for those who disobey. D) A. Penalize all non-participants immediately
A) C. Unethical because it violates privacy rights and due process, regardless of motive. B) B. Acceptable if done discreetly. C) A. Acceptable if it prevents corporate loss. D) D. Justifiable only if ordered by management.
A) B. Begin with site observation, followed by data gathering, risk identification, and recommendation of layered security measures. B) C. Interview employees first, then design new policies without physical inspection. C) D. Draft security protocols immediately without environmental scanning. D) A. Conduct risk assessment only after incidents occur
A) A. Acceptable since technology can replace manpower B) C. Efficient because it saves manpower resources. C) D. Permissible if incidents are infrequent. D) B. Risky because technological reliance reduces deterrence and real-time response
A) B. Controlling and mitigating identified threats B) D. Recruiting qualified guards C) A. Responding to emergencies D) C. Recording all incidents
A) B. Dismiss the employee immediately to set an example. B) A. Strengthen digital access control and implement strict data classification protocols. C) D. Increase surveillance on all staff computers without consent. D) C. Restrict all email communications without policy review.
A) A. Emergency response readiness B) B. Facility evacuation procedures C) D. Insurance claim processing D) C. Strategic redundancy and recovery implementation
A) A. Hiring additional guards B) C. Installing more lighting C) D. Conducting employee drills D) B. Developing an incident response plan
A) A. Access credentials B) B. Trust and reliability C) C. Firewalls and passwords D) D. Corporate image
A) A. Reactive and segment B) B. Proactive and integrative C) C. Procedural and limited D) D. Defensive and passive
A) C. Threat profiling B) A. Security audit C) D. Loss estimation D) B. Risk quantification
A) A. Lock and key B) C. Plan and rehearsal C) B. Cause and effect D) D. Fire and extinguisher
A) D. Overdelegation of duties B) A. Lack of dynamic threat simulation C) B. Excessive focus on fire safety D) C. Too much documentation
A) C. Asset visibility B) D. Guard rotation C) B. Access control D) A. Data confidentiality
A) D. Hiring external auditors post-crisis B) C. Acquisition of insurance policy only C) B. Immediate employee retraining D) A. Rapid operational recovery despite facility damage
A) C. Interviewing random employees only B) D. Writing a generic safety report C) A. Linking identified vulnerabilities with risk probability and consequence D) B. Listing all available equipment
A) C. Client demand B) A. Cost-benefit ratio versus threat likelihood C) B. Supervisor preference D) D. Legal documentation alone
A) b) Reviewing the company’s existing security policies and procedures. B) a) Installing the latest security technology. C) d) Interviewing all employees to gather their security concerns. D) c) Assessing the external threats and vulnerabilities of the new location.
A) a) A fresh coat of paint. B) c) A well-trained crew following emergency protocols C) b) A detailed passenger manifest. D) d) A fully stocked galley.
A) c) Conduct a comprehensive risk assessment, update document and information security protocols, and provide regular training to employees on data protection best practices. B) b) Implement stricter penalties for employees who violate data security policies C) d) Hire more IT personnel to monitor network traffic D) a) Increase the budget for cybersecurity software.
A) b) The number of security guards patrolling the facility. B) c) A combination of reduced security incidents, successful perimeter breach attempts, and employee feedback on safety perceptions. C) d) The amount of money spent on physical security equipment and personnel D) a) The number of security cameras installed on the premises
A) d) Publicly confront the applicant and demand an explanation for the misrepresentation. B) b) Ignore the discrepancy if the applicant is otherwise qualified C) a) Immediately reject the applicant without further consideration. D) c) Conduct a thorough investigation to verify the accuracy of the applicant’s information and assess the potential risk to the organization.
A) D. The tailgating issue is minor since no breach has yet occurred. B) B. Surveillance compensates for procedural lapses C) A.Physical security measures are effective and sufficient. D) C. The human element in access control weakens an otherwise strong system
A) B. Physical barrier design versus emergency evacuation speed B) C. Budget allocation versus client perception C) A. Technology dependence versus manpower redundancy D) D. Legal compliance versus administrative convenience
A) C. Data digitization accuracy B) D. Archival accessibility C) B. Confidentiality and integrity assurance D) A. Records retrieval efficiency
A) D. Minor issue if files are later deleted B) B. Violation of confidentiality principle due to insecure transmission medium C) A. Acceptable since recipients are authorized D) C. Efficient communication outweighs minor risk
A) D. Inadequate visitor management procedures B) B. Overemphasis on perimeter defense, neglecting information security policy C) A. Failure of physical access control D) C. Ineffective background investigation
A) D. Promoting walkable streets to enhance community interaction B) A. Creating a centralized business district to encourage economic growth C) C. Zoning residential areas with clear boundaries and layered access control D) B. Installing CCTV cameras at every street corner to reduce crime
A) B. Excessive transparency in façade design reducing perceived control B) C. Overcrowding of retail shops limiting natural surveillance C) A. Absence of defensive architecture like bollards D) D. The use of modern materials prone to forced entry
A) C. Virtue Ethics – Green areas reflect the moral character of urban developers B) D. Social Contract – Citizens must follow rules set by planners who include greenspaces C) A. Deontological – Urban greenery is a duty of the government regardless of outcomes D) B. Utilitarian – Urban greenspaces reduce crime and promote overall public well- being
A) C. Mixed-use developments with passive surveillance and active frontage B) D. Isolated parks with hidden CCTV systems C) A. High steel perimeter fencing with monitored gates D) B. Narrow alleyways with overhead motion sensors
A) A. Development A is more secure due to limited access and high boundary protection. B) C. Development B fosters natural surveillance and community ownership, making it more resilient. C) B. Development B poses higher security risk due to permeability and openness D) D. Development A exemplifies CPTED by reducing opportunities for observation by outsiders.
A) D. It can be justified if CCTV coverage is installed B) C. It aligns with traditional architectural philosophy. C) A. It optimizes business space and should proceed. D) B. It violates basic environmental design principles by increasing opportunities for concealment and crime.
A) D. Architects are solely responsible for aesthetic integrity, not safety measures. B) A. Form should always follow aesthetics. C) C. Security can be an afterthought once design is complete. D) B. Function and resilience must harmonize with design — security and safety are integral, not decorative
A) C. Relying on mechanical security systems B) B. Empowering occupants to control territorial space C) A. Enforcement of zoning laws D) D. Reducing architectural costs
A) D. Community programs are outdated in modern cities B) B. Overreliance on surveillance undermines human-centered, layered defense principles C) A. Security should rely solely on advanced technology. D) C. Automation guarantees total safety
A) B. Human behavior is unpredictable, so only technology ensures safety. B) D. Architectural design has no ethical impact on security management. C) C. Effective safety is achieved when design minimizes human error and supports policy compliance. D) A. Security policies should adapt to physical limitations.
A) C. Reactive defense B) A. Psychological deterrence C) B. Crime prevention through environmental design (CPTED) D) D. Passive surveillance
A) C. Discipline B) B. Efficiency C) A. Comfort D) D. Safety
A) B. Target hardening B) C. Natural surveillance C) C. Natural surveillance D) A. Human factor engineering
A) C. Broken Windows Theory B) B. Environmental Criminology C) A. Rational Choice Theory D) D. Social Learning Theory
A) B. Assessing how structure supports prevention B) D. Measuring employee satisfaction C) A. Checking building aesthetics D) C. Estimating construction cost
A) B. Defensible Space B) D. Territorial Reinforcement C) C. Natural Surveillance D) A. Target Hardening
A) B. Access Control B) C. Human-Centered Design C) D. Symbolic Security D) A. Environmental Aesthetics
A) C. Defensible Space B) B. Natural Surveillance C) D. Security Zoning D) A. Territoriality
A) C. Environmental Deterrence B) B. Symbolic Architecture C) D. Situational Hardening D) A. Human-Centered Security Design
A) A. CPTED B) C. Broken Windows Theory C) B. Routine Activity Theory D) D. Rational Choice Theory
A) c) Removing all vegetation to eliminate hiding places and installing bright, glaring lights. B) a) Installing high fences around the park and limiting access to daylight hours. C) d) Redesigning the park to include clear sightlines, well-maintained landscaping, community gardens, and designated activity areas to encourage legitimate use and natural surveillance. D) b) Increasing police patrols and installing surveillance cameras throughout the park.
A) c) Relying solely on a highly trained security force to patrol the building and monitor visitor access. B) b) Implementing a series of increasingly restrictive security measures, starting with a welcoming public lobby and progressing to controlled access points for sensitive areas, utilizing technology like biometrics and smart cards C) d) Eliminating all public access and conducting all business remotely. D) a) Creating a fortress-like structure with minimal windows and a single, heavily guarded entrance.
A) c) Over-policing and discriminatory practices in marginalized communities. B) b) An increase in serious crime rates. C) d) A decline in community engagement and social cohesion. D) a) A decrease in property values in low-income neighborhoods
A) d) Purchasing insurance policies to cover the potential loss of artifacts B) a) Storing all artifacts in a single, highly secure vault with limited access. C) b) Displaying artifacts in glass cases with basic alarms and relying on security guards to monitor the exhibits D) c) Utilizing a combination of reinforced display cases with advanced sensors, layered access control systems, real-time video analytics, and strategically placed architectural barriers to deter and detect potential threats.
A) b) Encouraging a vibrant mix of land uses and pedestrian activity to create a safer and more engaging public realm B) c) Implementing strict curfews and loitering laws C) d) Separating residential areas from commercial zones to educe crime. D) a) Installing surveillance cameras on every street corner |