A) B. Standardization of post duties B) C. Compliance to service contract obligations C) D. Rotation of personnel D) A. Optimization of manpower
A) B. A manager integrates security protocols with disaster preparedness plans B) D. A manager limits guard functions to access control C) C. A manager focuses on surveillance only D) A. A manager assigns guards based on seniority
A) C. A clerk following old company rules B) D. A farmer changing planting schedules C) A. A doctor maintaining continuous medical education D) B. A mechanic adjusting tools for faster repair
A) A. Promoting security as mere enforcement B) B. Elevating security management to a recognized profession C) D. Encouraging more commercial licenses D) C. Restricting entry into the field of private protection
A) D. Participation in PNP-SOSIA certification B) A. Annual re-training of guards C) C. Renewal of license without retraining D) B. Seminar on modern threat response
A) D. Training exemption clause B) C. Managerial discretion in deployment C) B. Operational flexibility of agencies D) A. Professional regulation and accountability
A) B. Implementing continuing professional development and ethics training B) A. Reducing the guard-to-client ratio C) D. Limiting the scope of internal audits D) C. Outsourcing background checks
A) A. The Labor Code is to employment B) C. The Penal Code is to punishment C) D. The NBI Charter is to investigation D) B. The Civil Code is to property
A) D. It reduces administrative load B) B. It aligns with practical field operations C) C. It promotes efficient manpower use D) A. It violates regulatory competence standards
A) D. Decrease in security awareness training B) B. Consistent adherence to competency-based performance standards C) A. Reduced turnover due to higher wages D) C. Increase in unregistered security firms
A) C. Institutional autonomy B) B. Ethical accountability C) D. Corporate sustainability D) A. Efficiency in operations
A) C. Fiscal accountability B) A. Delegation of authority C) D. Administrative discretion D) B. Regulatory compliance in operational management
A) A. A private nurse working under DOH regulation B) C. A private bank following BSP risk assessment C) B. A barangay tanod acting as a police auxiliary D) D. A corporate lawyer bound by IBP ethics
A) C. The ratio of guards to clients B) A. The number of personnel trained annually C) D. The frequency of policy updates D) B. The consistency of security actions with ethical standards
A) A. Security firms competing for higher pay rates B) C. Managers outsourcing training programs C) B. Guards exercising discretion guided by legal standards D) D. Agencies avoiding government audits
A) c) To limit the number of professionals in a specific field B) a) To ensure professionals earn a high income C) d) To promote competition among professionals D) b) To provide guidelines for professional conduct and integrity
A) a) To supervise and control the PRBs B) b) To provide funding for the PRBs C) d) To ignore the PRBs D) c) To compete with the PRBs
A) b) Mandating Continuing Professional Development (CPD) B) c) Encouraging research and innovation in professional fields C) d) Guaranteeing employment for all professionals D) a) Implementing rigorous licensure examinations
A) b) To ensure professionals meet global benchmarks and can compete internationally B) d) To limit the scope of practice for professionals C) c) To reduce the cost of professional services D) a) To make it easier for professionals to find jobs
A) b) Higher prices for professional services B) a) Increased taxes for the public C) d) Reduced access to professional services D) c) Enhanced quality and safety of professional services
A) C. Ethical governance B) B. Administrative coordination C) A. Regulatory compliance D) D. Operational discretion
A) B. Ensure standardized training and accountability B) D. Allow private security to act as quasi-police forces C) C. Expand the jurisdiction of the PNP D) A. Reduce the cost of agency operations
A) A. Report the company to DTI B) C. Uphold the law despite business pressure C) D. Wait for formal complaint before acting D) B. Refuse compliance and justify business necessity
A) A. Efficiency over legality B) D. Centralized command approach C) B. Integration of competence and accountability D) C. Profit-driven motivation
A) C. Professional autonomy and responsibility B) A. Ethical minimalism C) D. Administrative hierarchy D) B. Managerial compliance
A) A. A guard ignores customer concerns to maintain discipline B) B. A guard de-escalates a confrontation through calm communication C) D. A guard prioritizes rules over empathy D) C. A guard detains a customer for minor inconvenience
A) C. Involves court procedures B) A. Focuses on criminal liability C) B. Aims to anticipate threats for decision-making D) D. Deals only with insider theft
A) B. Coordination of customer relations with safety protoco B) A. Violation of safety ethics C) D. Failure of situational awareness D) C. Overstepping of duties
A) B. Emotional intelligence and restraint B) C. Verbal dominance C) A. Assertive body language D) D. Physical authority
A) A. Detecting minor violations B) D. Collecting data without analysis C) B. Predicting business risks through information synthesis D) C. Focusing on post-crime reporting
A) D. Defensive compliance to avoid escalation B) C. Strict enforcement without compromise C) B. Customer-centred communication and conflict de-escalation D) A. Command presence over customers
A) C. Safety communication ethics B) D. Emergency command protocol C) A. Reporting chain of command D) B. Preventive risk escalation
A) D. Administrative reporting B) C. Personal safety and incident prevention C) A. Uniform compliance D) B. Operational discipline
A) B. Violates impartiality and universal duty of care in emergency protocol B) A. Acceptable prioritization since VIPs are high-value clients C) D. Proper since client satisfaction is primary in service delivery D) C. Logistically correct because VIPs move faster and clear exits sooner
A) B. Continue the policy without modification B) C. Reassess workflow to integrate courtesy without compromising readiness C) A. Discontinue the new greeting to restore speed D) D. Enforce stricter penalties for slow response times
A) b) Implement a zero-tolerance policy for complaints against security personne B) d) Reduce the security team's interaction with customers to minimize potential conflicts C) c) Integrate comprehensive customer service training, including active listening and empathy, into the security team's ongoing professional development. D) a) Replace the entire security team with personnel from a customer service background.
A) b) A balanced diet and regular exercise. B) a) A stylish outfit. C) c) A first-aid kit. D) d) A comfortable chair
A) a) Immediately terminate all employees who bypassed security protocols. B) b) Ignore the breaches to avoid disrupting employee morale and productivity. C) d) Implement stricter, more complex security protocols to deter future breaches, regardless of the impact on productivity D) c) Conduct a thorough review of existing security protocols, identify areas of unnecessary friction, and implement user-friendly alternatives while reinforcing security awareness training.
A) b) The amount of money spent on security technology and personnel B) d) The number of security certifications held by security personnel. C) a) The number of security drills conducted per year. D) c) A combination of reduced security incidents, improved employee awareness scores, and positive customer feedback on security interactions
A) a) Immediately alert all security personnel and initiate a lockdown of the facility B) b) Ignore the situation unless the individual successfully gains access to the restricted area. C) d) Publicly confront the individual and demand an explanation in front of other employees and visitors. D) c) Discreetly approach the individual, politely inquire about their identity and purpose, and verify the validity of the keycard
A) D. Firearms proficiency B) B. Surveillance techniques C) A. Customer relations and crisis communication D) C. Legal procedures
A) A. Poor information integration B) B. Excessive procedural compliance C) D. Lack of physical deterrence D) C. Overreliance on electronic systems
A) D. cooperation B) A. detection C) B. discipline D) C. deterrence
A) C. Frequency of drills B) B. Number of employees trained C) A. Reduction in incident recurrence after implementation D) D. Cost of materials used
A) A. Integrate human relations training with corporate intelligence modules B) C. Isolate intelligence from guest operations C) D. Focus solely on surveillance hardware D) B. Replace personnel with IT-based monitoring
A) A. Allow entry to avoid conflict, since the visitor claims VIP status. B) C. Maintain composure, explain the protocol’s importance in a respectful manner, and discreetly verify with superiors if exceptions apply. C) D. Deny entry outright and warn the visitor that noncompliance is a violation D) B. Call for backup immediately and confront the visitor in a firm tone
A) B. Conduct discreet surveillance and document patterns before informing management B) C. Immediately suspend the employee pending investigation. C) A. Publicly confront the employee to make an example for others. D) D. Ignore the activity until concrete proof of data theft is found.
A) D. Conflict prevention B) A. Convenience of service C) B. Operational discipline D) C. Corporate flexibility
A) D. Repeat the drill without feedback to ensure familiarity B) B. Submit a report and recommend termination for those who disobey. C) C. Conduct a debriefing to identify behavioral gaps and emphasize real-world implications of non-compliance. D) A. Penalize all non-participants immediately
A) C. Unethical because it violates privacy rights and due process, regardless of motive. B) A. Acceptable if it prevents corporate loss. C) B. Acceptable if done discreetly. D) D. Justifiable only if ordered by management.
A) A. Conduct risk assessment only after incidents occur B) C. Interview employees first, then design new policies without physical inspection. C) B. Begin with site observation, followed by data gathering, risk identification, and recommendation of layered security measures. D) D. Draft security protocols immediately without environmental scanning.
A) A. Acceptable since technology can replace manpower B) D. Permissible if incidents are infrequent. C) B. Risky because technological reliance reduces deterrence and real-time response D) C. Efficient because it saves manpower resources.
A) B. Controlling and mitigating identified threats B) D. Recruiting qualified guards C) C. Recording all incidents D) A. Responding to emergencies
A) C. Restrict all email communications without policy review. B) B. Dismiss the employee immediately to set an example. C) D. Increase surveillance on all staff computers without consent. D) A. Strengthen digital access control and implement strict data classification protocols.
A) C. Strategic redundancy and recovery implementation B) D. Insurance claim processing C) A. Emergency response readiness D) B. Facility evacuation procedures
A) A. Hiring additional guards B) C. Installing more lighting C) D. Conducting employee drills D) B. Developing an incident response plan
A) C. Firewalls and passwords B) A. Access credentials C) B. Trust and reliability D) D. Corporate image
A) D. Defensive and passive B) A. Reactive and segment C) B. Proactive and integrative D) C. Procedural and limited
A) C. Threat profiling B) D. Loss estimation C) B. Risk quantification D) A. Security audit
A) B. Cause and effect B) A. Lock and key C) C. Plan and rehearsal D) D. Fire and extinguisher
A) B. Excessive focus on fire safety B) A. Lack of dynamic threat simulation C) C. Too much documentation D) D. Overdelegation of duties
A) C. Asset visibility B) D. Guard rotation C) A. Data confidentiality D) B. Access control
A) B. Immediate employee retraining B) D. Hiring external auditors post-crisis C) A. Rapid operational recovery despite facility damage D) C. Acquisition of insurance policy only
A) D. Writing a generic safety report B) B. Listing all available equipment C) C. Interviewing random employees only D) A. Linking identified vulnerabilities with risk probability and consequence
A) A. Cost-benefit ratio versus threat likelihood B) D. Legal documentation alone C) C. Client demand D) B. Supervisor preference
A) d) Interviewing all employees to gather their security concerns. B) b) Reviewing the company’s existing security policies and procedures. C) a) Installing the latest security technology. D) c) Assessing the external threats and vulnerabilities of the new location.
A) a) A fresh coat of paint. B) b) A detailed passenger manifest. C) c) A well-trained crew following emergency protocols D) d) A fully stocked galley.
A) b) Implement stricter penalties for employees who violate data security policies B) a) Increase the budget for cybersecurity software. C) c) Conduct a comprehensive risk assessment, update document and information security protocols, and provide regular training to employees on data protection best practices. D) d) Hire more IT personnel to monitor network traffic
A) b) The number of security guards patrolling the facility. B) d) The amount of money spent on physical security equipment and personnel C) a) The number of security cameras installed on the premises D) c) A combination of reduced security incidents, successful perimeter breach attempts, and employee feedback on safety perceptions.
A) b) Ignore the discrepancy if the applicant is otherwise qualified B) a) Immediately reject the applicant without further consideration. C) c) Conduct a thorough investigation to verify the accuracy of the applicant’s information and assess the potential risk to the organization. D) d) Publicly confront the applicant and demand an explanation for the misrepresentation.
A) B. Surveillance compensates for procedural lapses B) D. The tailgating issue is minor since no breach has yet occurred. C) C. The human element in access control weakens an otherwise strong system D) A.Physical security measures are effective and sufficient.
A) A. Technology dependence versus manpower redundancy B) D. Legal compliance versus administrative convenience C) C. Budget allocation versus client perception D) B. Physical barrier design versus emergency evacuation speed
A) C. Data digitization accuracy B) D. Archival accessibility C) B. Confidentiality and integrity assurance D) A. Records retrieval efficiency
A) D. Minor issue if files are later deleted B) B. Violation of confidentiality principle due to insecure transmission medium C) C. Efficient communication outweighs minor risk D) A. Acceptable since recipients are authorized
A) D. Inadequate visitor management procedures B) C. Ineffective background investigation C) B. Overemphasis on perimeter defense, neglecting information security policy D) A. Failure of physical access control
A) D. Promoting walkable streets to enhance community interaction B) A. Creating a centralized business district to encourage economic growth C) C. Zoning residential areas with clear boundaries and layered access control D) B. Installing CCTV cameras at every street corner to reduce crime
A) A. Absence of defensive architecture like bollards B) D. The use of modern materials prone to forced entry C) B. Excessive transparency in façade design reducing perceived control D) C. Overcrowding of retail shops limiting natural surveillance
A) D. Social Contract – Citizens must follow rules set by planners who include greenspaces B) B. Utilitarian – Urban greenspaces reduce crime and promote overall public well- being C) C. Virtue Ethics – Green areas reflect the moral character of urban developers D) A. Deontological – Urban greenery is a duty of the government regardless of outcomes
A) B. Narrow alleyways with overhead motion sensors B) C. Mixed-use developments with passive surveillance and active frontage C) A. High steel perimeter fencing with monitored gates D) D. Isolated parks with hidden CCTV systems
A) D. Development A exemplifies CPTED by reducing opportunities for observation by outsiders. B) B. Development B poses higher security risk due to permeability and openness C) A. Development A is more secure due to limited access and high boundary protection. D) C. Development B fosters natural surveillance and community ownership, making it more resilient.
A) D. It can be justified if CCTV coverage is installed B) B. It violates basic environmental design principles by increasing opportunities for concealment and crime. C) A. It optimizes business space and should proceed. D) C. It aligns with traditional architectural philosophy.
A) D. Architects are solely responsible for aesthetic integrity, not safety measures. B) C. Security can be an afterthought once design is complete. C) A. Form should always follow aesthetics. D) B. Function and resilience must harmonize with design — security and safety are integral, not decorative
A) C. Relying on mechanical security systems B) B. Empowering occupants to control territorial space C) D. Reducing architectural costs D) A. Enforcement of zoning laws
A) C. Automation guarantees total safety B) A. Security should rely solely on advanced technology. C) B. Overreliance on surveillance undermines human-centered, layered defense principles D) D. Community programs are outdated in modern cities
A) C. Effective safety is achieved when design minimizes human error and supports policy compliance. B) B. Human behavior is unpredictable, so only technology ensures safety. C) A. Security policies should adapt to physical limitations. D) D. Architectural design has no ethical impact on security management.
A) D. Passive surveillance B) C. Reactive defense C) B. Crime prevention through environmental design (CPTED) D) A. Psychological deterrence
A) C. Discipline B) A. Comfort C) D. Safety D) B. Efficiency
A) C. Natural surveillance B) A. Human factor engineering C) B. Target hardening D) C. Natural surveillance
A) C. Broken Windows Theory B) A. Rational Choice Theory C) B. Environmental Criminology D) D. Social Learning Theory
A) D. Measuring employee satisfaction B) B. Assessing how structure supports prevention C) C. Estimating construction cost D) A. Checking building aesthetics
A) A. Target Hardening B) B. Defensible Space C) D. Territorial Reinforcement D) C. Natural Surveillance
A) B. Access Control B) C. Human-Centered Design C) A. Environmental Aesthetics D) D. Symbolic Security
A) C. Defensible Space B) B. Natural Surveillance C) A. Territoriality D) D. Security Zoning
A) C. Environmental Deterrence B) B. Symbolic Architecture C) A. Human-Centered Security Design D) D. Situational Hardening
A) D. Rational Choice Theory B) C. Broken Windows Theory C) A. CPTED D) B. Routine Activity Theory
A) b) Increasing police patrols and installing surveillance cameras throughout the park. B) a) Installing high fences around the park and limiting access to daylight hours. C) c) Removing all vegetation to eliminate hiding places and installing bright, glaring lights. D) d) Redesigning the park to include clear sightlines, well-maintained landscaping, community gardens, and designated activity areas to encourage legitimate use and natural surveillance.
A) b) Implementing a series of increasingly restrictive security measures, starting with a welcoming public lobby and progressing to controlled access points for sensitive areas, utilizing technology like biometrics and smart cards B) a) Creating a fortress-like structure with minimal windows and a single, heavily guarded entrance. C) c) Relying solely on a highly trained security force to patrol the building and monitor visitor access. D) d) Eliminating all public access and conducting all business remotely.
A) c) Over-policing and discriminatory practices in marginalized communities. B) d) A decline in community engagement and social cohesion. C) b) An increase in serious crime rates. D) a) A decrease in property values in low-income neighborhoods
A) c) Utilizing a combination of reinforced display cases with advanced sensors, layered access control systems, real-time video analytics, and strategically placed architectural barriers to deter and detect potential threats. B) a) Storing all artifacts in a single, highly secure vault with limited access. C) d) Purchasing insurance policies to cover the potential loss of artifacts D) b) Displaying artifacts in glass cases with basic alarms and relying on security guards to monitor the exhibits
A) c) Implementing strict curfews and loitering laws B) d) Separating residential areas from commercial zones to educe crime. C) a) Installing surveillance cameras on every street corner D) b) Encouraging a vibrant mix of land uses and pedestrian activity to create a safer and more engaging public realm |