A) D. Rotation of personnel B) B. Standardization of post duties C) A. Optimization of manpower D) C. Compliance to service contract obligations
A) C. A manager focuses on surveillance only B) A. A manager assigns guards based on seniority C) D. A manager limits guard functions to access control D) B. A manager integrates security protocols with disaster preparedness plans
A) B. A mechanic adjusting tools for faster repair B) C. A clerk following old company rules C) D. A farmer changing planting schedules D) A. A doctor maintaining continuous medical education
A) C. Restricting entry into the field of private protection B) D. Encouraging more commercial licenses C) B. Elevating security management to a recognized profession D) A. Promoting security as mere enforcement
A) A. Annual re-training of guards B) D. Participation in PNP-SOSIA certification C) B. Seminar on modern threat response D) C. Renewal of license without retraining
A) D. Training exemption clause B) A. Professional regulation and accountability C) B. Operational flexibility of agencies D) C. Managerial discretion in deployment
A) B. Implementing continuing professional development and ethics training B) D. Limiting the scope of internal audits C) A. Reducing the guard-to-client ratio D) C. Outsourcing background checks
A) D. The NBI Charter is to investigation B) B. The Civil Code is to property C) C. The Penal Code is to punishment D) A. The Labor Code is to employment
A) D. It reduces administrative load B) C. It promotes efficient manpower use C) B. It aligns with practical field operations D) A. It violates regulatory competence standards
A) D. Decrease in security awareness training B) C. Increase in unregistered security firms C) B. Consistent adherence to competency-based performance standards D) A. Reduced turnover due to higher wages
A) A. Efficiency in operations B) B. Ethical accountability C) C. Institutional autonomy D) D. Corporate sustainability
A) A. Delegation of authority B) C. Fiscal accountability C) B. Regulatory compliance in operational management D) D. Administrative discretion
A) A. A private nurse working under DOH regulation B) B. A barangay tanod acting as a police auxiliary C) D. A corporate lawyer bound by IBP ethics D) C. A private bank following BSP risk assessment
A) A. The number of personnel trained annually B) D. The frequency of policy updates C) B. The consistency of security actions with ethical standards D) C. The ratio of guards to clients
A) B. Guards exercising discretion guided by legal standards B) A. Security firms competing for higher pay rates C) C. Managers outsourcing training programs D) D. Agencies avoiding government audits
A) d) To promote competition among professionals B) a) To ensure professionals earn a high income C) c) To limit the number of professionals in a specific field D) b) To provide guidelines for professional conduct and integrity
A) a) To supervise and control the PRBs B) c) To compete with the PRBs C) b) To provide funding for the PRBs D) d) To ignore the PRBs
A) a) Implementing rigorous licensure examinations B) b) Mandating Continuing Professional Development (CPD) C) c) Encouraging research and innovation in professional fields D) d) Guaranteeing employment for all professionals
A) d) To limit the scope of practice for professionals B) a) To make it easier for professionals to find jobs C) b) To ensure professionals meet global benchmarks and can compete internationally D) c) To reduce the cost of professional services
A) b) Higher prices for professional services B) c) Enhanced quality and safety of professional services C) d) Reduced access to professional services D) a) Increased taxes for the public
A) B. Administrative coordination B) A. Regulatory compliance C) C. Ethical governance D) D. Operational discretion
A) B. Ensure standardized training and accountability B) A. Reduce the cost of agency operations C) D. Allow private security to act as quasi-police forces D) C. Expand the jurisdiction of the PNP
A) B. Refuse compliance and justify business necessity B) C. Uphold the law despite business pressure C) D. Wait for formal complaint before acting D) A. Report the company to DTI
A) B. Integration of competence and accountability B) A. Efficiency over legality C) C. Profit-driven motivation D) D. Centralized command approach
A) A. Ethical minimalism B) D. Administrative hierarchy C) C. Professional autonomy and responsibility D) B. Managerial compliance
A) C. A guard detains a customer for minor inconvenience B) D. A guard prioritizes rules over empathy C) A. A guard ignores customer concerns to maintain discipline D) B. A guard de-escalates a confrontation through calm communication
A) D. Deals only with insider theft B) C. Involves court procedures C) B. Aims to anticipate threats for decision-making D) A. Focuses on criminal liability
A) B. Coordination of customer relations with safety protoco B) C. Overstepping of duties C) D. Failure of situational awareness D) A. Violation of safety ethics
A) B. Emotional intelligence and restraint B) C. Verbal dominance C) D. Physical authority D) A. Assertive body language
A) D. Collecting data without analysis B) A. Detecting minor violations C) B. Predicting business risks through information synthesis D) C. Focusing on post-crime reporting
A) D. Defensive compliance to avoid escalation B) B. Customer-centred communication and conflict de-escalation C) A. Command presence over customers D) C. Strict enforcement without compromise
A) D. Emergency command protocol B) A. Reporting chain of command C) B. Preventive risk escalation D) C. Safety communication ethics
A) B. Operational discipline B) D. Administrative reporting C) A. Uniform compliance D) C. Personal safety and incident prevention
A) B. Violates impartiality and universal duty of care in emergency protocol B) A. Acceptable prioritization since VIPs are high-value clients C) D. Proper since client satisfaction is primary in service delivery D) C. Logistically correct because VIPs move faster and clear exits sooner
A) A. Discontinue the new greeting to restore speed B) D. Enforce stricter penalties for slow response times C) B. Continue the policy without modification D) C. Reassess workflow to integrate courtesy without compromising readiness
A) c) Integrate comprehensive customer service training, including active listening and empathy, into the security team's ongoing professional development. B) a) Replace the entire security team with personnel from a customer service background. C) b) Implement a zero-tolerance policy for complaints against security personne D) d) Reduce the security team's interaction with customers to minimize potential conflicts
A) b) A balanced diet and regular exercise. B) a) A stylish outfit. C) c) A first-aid kit. D) d) A comfortable chair
A) d) Implement stricter, more complex security protocols to deter future breaches, regardless of the impact on productivity B) a) Immediately terminate all employees who bypassed security protocols. C) b) Ignore the breaches to avoid disrupting employee morale and productivity. D) c) Conduct a thorough review of existing security protocols, identify areas of unnecessary friction, and implement user-friendly alternatives while reinforcing security awareness training.
A) c) A combination of reduced security incidents, improved employee awareness scores, and positive customer feedback on security interactions B) d) The number of security certifications held by security personnel. C) b) The amount of money spent on security technology and personnel D) a) The number of security drills conducted per year.
A) d) Publicly confront the individual and demand an explanation in front of other employees and visitors. B) a) Immediately alert all security personnel and initiate a lockdown of the facility C) b) Ignore the situation unless the individual successfully gains access to the restricted area. D) c) Discreetly approach the individual, politely inquire about their identity and purpose, and verify the validity of the keycard
A) A. Customer relations and crisis communication B) C. Legal procedures C) B. Surveillance techniques D) D. Firearms proficiency
A) A. Poor information integration B) D. Lack of physical deterrence C) C. Overreliance on electronic systems D) B. Excessive procedural compliance
A) C. deterrence B) B. discipline C) A. detection D) D. cooperation
A) D. Cost of materials used B) B. Number of employees trained C) A. Reduction in incident recurrence after implementation D) C. Frequency of drills
A) D. Focus solely on surveillance hardware B) A. Integrate human relations training with corporate intelligence modules C) B. Replace personnel with IT-based monitoring D) C. Isolate intelligence from guest operations
A) C. Maintain composure, explain the protocol’s importance in a respectful manner, and discreetly verify with superiors if exceptions apply. B) A. Allow entry to avoid conflict, since the visitor claims VIP status. C) D. Deny entry outright and warn the visitor that noncompliance is a violation D) B. Call for backup immediately and confront the visitor in a firm tone
A) D. Ignore the activity until concrete proof of data theft is found. B) A. Publicly confront the employee to make an example for others. C) B. Conduct discreet surveillance and document patterns before informing management D) C. Immediately suspend the employee pending investigation.
A) B. Operational discipline B) C. Corporate flexibility C) A. Convenience of service D) D. Conflict prevention
A) C. Conduct a debriefing to identify behavioral gaps and emphasize real-world implications of non-compliance. B) B. Submit a report and recommend termination for those who disobey. C) A. Penalize all non-participants immediately D) D. Repeat the drill without feedback to ensure familiarity
A) D. Justifiable only if ordered by management. B) B. Acceptable if done discreetly. C) A. Acceptable if it prevents corporate loss. D) C. Unethical because it violates privacy rights and due process, regardless of motive.
A) D. Draft security protocols immediately without environmental scanning. B) A. Conduct risk assessment only after incidents occur C) C. Interview employees first, then design new policies without physical inspection. D) B. Begin with site observation, followed by data gathering, risk identification, and recommendation of layered security measures.
A) B. Risky because technological reliance reduces deterrence and real-time response B) C. Efficient because it saves manpower resources. C) A. Acceptable since technology can replace manpower D) D. Permissible if incidents are infrequent.
A) B. Controlling and mitigating identified threats B) A. Responding to emergencies C) C. Recording all incidents D) D. Recruiting qualified guards
A) D. Increase surveillance on all staff computers without consent. B) B. Dismiss the employee immediately to set an example. C) A. Strengthen digital access control and implement strict data classification protocols. D) C. Restrict all email communications without policy review.
A) D. Insurance claim processing B) C. Strategic redundancy and recovery implementation C) A. Emergency response readiness D) B. Facility evacuation procedures
A) B. Developing an incident response plan B) C. Installing more lighting C) D. Conducting employee drills D) A. Hiring additional guards
A) D. Corporate image B) B. Trust and reliability C) A. Access credentials D) C. Firewalls and passwords
A) B. Proactive and integrative B) D. Defensive and passive C) C. Procedural and limited D) A. Reactive and segment
A) C. Threat profiling B) A. Security audit C) B. Risk quantification D) D. Loss estimation
A) A. Lock and key B) B. Cause and effect C) D. Fire and extinguisher D) C. Plan and rehearsal
A) C. Too much documentation B) D. Overdelegation of duties C) B. Excessive focus on fire safety D) A. Lack of dynamic threat simulation
A) A. Data confidentiality B) B. Access control C) D. Guard rotation D) C. Asset visibility
A) D. Hiring external auditors post-crisis B) B. Immediate employee retraining C) C. Acquisition of insurance policy only D) A. Rapid operational recovery despite facility damage
A) D. Writing a generic safety report B) A. Linking identified vulnerabilities with risk probability and consequence C) B. Listing all available equipment D) C. Interviewing random employees only
A) C. Client demand B) A. Cost-benefit ratio versus threat likelihood C) D. Legal documentation alone D) B. Supervisor preference
A) d) Interviewing all employees to gather their security concerns. B) a) Installing the latest security technology. C) c) Assessing the external threats and vulnerabilities of the new location. D) b) Reviewing the company’s existing security policies and procedures.
A) c) A well-trained crew following emergency protocols B) d) A fully stocked galley. C) b) A detailed passenger manifest. D) a) A fresh coat of paint.
A) d) Hire more IT personnel to monitor network traffic B) b) Implement stricter penalties for employees who violate data security policies C) a) Increase the budget for cybersecurity software. D) c) Conduct a comprehensive risk assessment, update document and information security protocols, and provide regular training to employees on data protection best practices.
A) a) The number of security cameras installed on the premises B) c) A combination of reduced security incidents, successful perimeter breach attempts, and employee feedback on safety perceptions. C) b) The number of security guards patrolling the facility. D) d) The amount of money spent on physical security equipment and personnel
A) d) Publicly confront the applicant and demand an explanation for the misrepresentation. B) c) Conduct a thorough investigation to verify the accuracy of the applicant’s information and assess the potential risk to the organization. C) b) Ignore the discrepancy if the applicant is otherwise qualified D) a) Immediately reject the applicant without further consideration.
A) C. The human element in access control weakens an otherwise strong system B) A.Physical security measures are effective and sufficient. C) D. The tailgating issue is minor since no breach has yet occurred. D) B. Surveillance compensates for procedural lapses
A) B. Physical barrier design versus emergency evacuation speed B) C. Budget allocation versus client perception C) D. Legal compliance versus administrative convenience D) A. Technology dependence versus manpower redundancy
A) C. Data digitization accuracy B) D. Archival accessibility C) B. Confidentiality and integrity assurance D) A. Records retrieval efficiency
A) C. Efficient communication outweighs minor risk B) A. Acceptable since recipients are authorized C) D. Minor issue if files are later deleted D) B. Violation of confidentiality principle due to insecure transmission medium
A) A. Failure of physical access control B) C. Ineffective background investigation C) D. Inadequate visitor management procedures D) B. Overemphasis on perimeter defense, neglecting information security policy
A) D. Promoting walkable streets to enhance community interaction B) A. Creating a centralized business district to encourage economic growth C) B. Installing CCTV cameras at every street corner to reduce crime D) C. Zoning residential areas with clear boundaries and layered access control
A) B. Excessive transparency in façade design reducing perceived control B) C. Overcrowding of retail shops limiting natural surveillance C) D. The use of modern materials prone to forced entry D) A. Absence of defensive architecture like bollards
A) C. Virtue Ethics – Green areas reflect the moral character of urban developers B) B. Utilitarian – Urban greenspaces reduce crime and promote overall public well- being C) D. Social Contract – Citizens must follow rules set by planners who include greenspaces D) A. Deontological – Urban greenery is a duty of the government regardless of outcomes
A) A. High steel perimeter fencing with monitored gates B) C. Mixed-use developments with passive surveillance and active frontage C) D. Isolated parks with hidden CCTV systems D) B. Narrow alleyways with overhead motion sensors
A) A. Development A is more secure due to limited access and high boundary protection. B) B. Development B poses higher security risk due to permeability and openness C) D. Development A exemplifies CPTED by reducing opportunities for observation by outsiders. D) C. Development B fosters natural surveillance and community ownership, making it more resilient.
A) A. It optimizes business space and should proceed. B) C. It aligns with traditional architectural philosophy. C) B. It violates basic environmental design principles by increasing opportunities for concealment and crime. D) D. It can be justified if CCTV coverage is installed
A) D. Architects are solely responsible for aesthetic integrity, not safety measures. B) C. Security can be an afterthought once design is complete. C) A. Form should always follow aesthetics. D) B. Function and resilience must harmonize with design — security and safety are integral, not decorative
A) B. Empowering occupants to control territorial space B) A. Enforcement of zoning laws C) D. Reducing architectural costs D) C. Relying on mechanical security systems
A) D. Community programs are outdated in modern cities B) B. Overreliance on surveillance undermines human-centered, layered defense principles C) A. Security should rely solely on advanced technology. D) C. Automation guarantees total safety
A) B. Human behavior is unpredictable, so only technology ensures safety. B) C. Effective safety is achieved when design minimizes human error and supports policy compliance. C) D. Architectural design has no ethical impact on security management. D) A. Security policies should adapt to physical limitations.
A) D. Passive surveillance B) B. Crime prevention through environmental design (CPTED) C) A. Psychological deterrence D) C. Reactive defense
A) C. Discipline B) D. Safety C) A. Comfort D) B. Efficiency
A) C. Natural surveillance B) A. Human factor engineering C) B. Target hardening D) C. Natural surveillance
A) B. Environmental Criminology B) C. Broken Windows Theory C) A. Rational Choice Theory D) D. Social Learning Theory
A) D. Measuring employee satisfaction B) A. Checking building aesthetics C) B. Assessing how structure supports prevention D) C. Estimating construction cost
A) C. Natural Surveillance B) D. Territorial Reinforcement C) A. Target Hardening D) B. Defensible Space
A) D. Symbolic Security B) A. Environmental Aesthetics C) B. Access Control D) C. Human-Centered Design
A) B. Natural Surveillance B) A. Territoriality C) D. Security Zoning D) C. Defensible Space
A) B. Symbolic Architecture B) A. Human-Centered Security Design C) D. Situational Hardening D) C. Environmental Deterrence
A) D. Rational Choice Theory B) C. Broken Windows Theory C) A. CPTED D) B. Routine Activity Theory
A) c) Removing all vegetation to eliminate hiding places and installing bright, glaring lights. B) a) Installing high fences around the park and limiting access to daylight hours. C) d) Redesigning the park to include clear sightlines, well-maintained landscaping, community gardens, and designated activity areas to encourage legitimate use and natural surveillance. D) b) Increasing police patrols and installing surveillance cameras throughout the park.
A) c) Relying solely on a highly trained security force to patrol the building and monitor visitor access. B) b) Implementing a series of increasingly restrictive security measures, starting with a welcoming public lobby and progressing to controlled access points for sensitive areas, utilizing technology like biometrics and smart cards C) a) Creating a fortress-like structure with minimal windows and a single, heavily guarded entrance. D) d) Eliminating all public access and conducting all business remotely.
A) a) A decrease in property values in low-income neighborhoods B) c) Over-policing and discriminatory practices in marginalized communities. C) b) An increase in serious crime rates. D) d) A decline in community engagement and social cohesion.
A) c) Utilizing a combination of reinforced display cases with advanced sensors, layered access control systems, real-time video analytics, and strategically placed architectural barriers to deter and detect potential threats. B) d) Purchasing insurance policies to cover the potential loss of artifacts C) a) Storing all artifacts in a single, highly secure vault with limited access. D) b) Displaying artifacts in glass cases with basic alarms and relying on security guards to monitor the exhibits
A) a) Installing surveillance cameras on every street corner B) b) Encouraging a vibrant mix of land uses and pedestrian activity to create a safer and more engaging public realm C) c) Implementing strict curfews and loitering laws D) d) Separating residential areas from commercial zones to educe crime. |