A) To create mechanical resistance B) To generate electrical signals C) To prevent unauthorized entry and removal of items D) To store digital combinations
A) It uses electromagnetic force B) It’s portable and detachable with a sliding hasp C) It’s permanently attached D) It requires a digital code
A) A lock picker B) A security system designed C) A type of key manufacturer D) A lock installation tool
A) Through electromagnetic pulses B) Through biometric scanning C) With digital combinations D) Using physical obstructions to block incorrect keys
A) They record usage time and user identity B) They operate solely on battery power C) They use mechanical tumblers D) They require physical keys
A) Using electromagnetic force and an armature plate B) Through digital keypads only C) With rotating discs D) Through mechanical pins
A) Through radio frequency identification B) Using a sequence of numbers in proper order C) Through mechanical key insertion D) By scanning fingerprints
A) A master key opens all locks in the building B) A master key works only in emergency situations C) A grand master key opens all in the building D) A grand master key only works on specific floors
A) To store maintenance supplies B) To hold only duplicate keys C) To keep employee records D) To store original keys for all locks in the system
A) Only master key assignments B) Reports from the person responsible for key control in personnel C) Only lost key incidents D) Report from the security department
A) They serve exactly the same purpose B) A safe is larger than a vault C) A vault is part of the building structure and more heavily constructed D) A vault is portable while a safe is fixed
A) Only tracking master key B) Annual inventory checks C) Weekly audits only D) Recording lock code numbers and key assignments
A) On a fixed monthly schedule B) Only during annual reviews C) Only when key are lost D) Unannounced and by management
A) Periodic accounting of all keys issued to employees B) Annual checks only C) Daily counts of master keys D) Weekly safe inspections
A) Because it involves technological assets B) Because it involves people both as assets and potential threats C) Because it involves physical infrastructure D) Because it involves financial resources
A) Developing security awareness among employees B) Serving as a screening device in hiring C) Providing background investigation services D) Managing building access control systems
A) Storage and Retrieval B) Transfer C) Creation D) Classification
A) Secret B) Restricted C) Top secret D) Confidential
A) Class II-Important Documents B) Class I-Vital Documents C) Class IV-Non-essential Documents D) Class III-Useful Documents
A) Information is costly B) Information requires barriers C) Information is expansive D) Information is voluminous
A) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty B) A method of evaluating employee performance C) A system of trafficking employee attendance D) A process of monitoring employee computer usage
A) Employment history B) Foreign travel history C) Social media passwords D) Criminal record
A) To inspect with careful thoroughness through personal interviews under stress B) To monitor employee internet usage C) To verify employment references D) To conduct random drug testing
A) Exit interview B) Positive vetting C) Financial inquiry D) Undercover investigation
A) Training makes security personnel conscious B) Security systems are more important than personnel training C) Training is necessary for the practice of NEED TO KNOW principle D) Personnel are the weakest link in the security chain
A) Private B) Restricted C) Secret D) Top secret
A) Red B) Green C) White D) Blue
A) Information is expansive B) Information requires barriers C) Information has a limited life D) Information is costly
A) Development among employees B) Financial awareness C) Employee development D) Technical awareness
A) Legal prosecution B) Immediate termination C) Protection against unfounded claims D) Public disclosure
A) By conducting performance reviews B) By serving as a screening device C) By focusing on technical skills only D) By managing payroll
A) Speed of hiring B) Automation of process C) Cost effectiveness D) Need for establishment
A) During orientation and training B) During the exit interview C) During refresher conferences D) During security promotions
A) NBI clearance B) Barangay clearance C) ISAFP clearance D) PNP Directorate for intelligence
A) To give departing employees an opportunity to list grievances B) To issue final paycheck C) To conduct final performance evaluation D) To collect company property
A) Predicting subject’s reactions in future critical situations through behavior observation B) Physical surveillance of employees C) Random security checks of employee workstations D) Monitoring of employee communications
A) To deter and impede potential spies B) To increase office efficiency C) To reduce storage costs D) To simplify document sharing
A) Manufacturing processes only B) Original literary and musical work C) Customer database only D) Business methods only
A) Personnel security B) Physical security C) Information security D) Technological security
A) It is easier to implement than other security measures B) It requires less oversight C) It involves protecting both assets and managing human threats D) It requires the most financial investment
A) Documentum-teaching or lesson B) Docere-to show C) Doctrina-teaching method D) Documenta-written proof
A) Green B) White C) Red D) Blue
A) Documents that are routine in nature B) Documents that are irreplaceable and critical for recovery C) Documents that are replaceable with some effort D) Documents that cause minor inconvenience if lost
A) Secret B) Restricted C) Confidential D) Top secret E) Private
A) Time management issues B) Attendance problems C) Only external threats D) Theft and sabotage
A) Financial approach B) Technological approach C) Comprehensive approach to protection and screening D) Reactive approach only
A) Natural disasters B) Technology failures C) Employee negligence or participation in theft D) External theft
A) Supporting employee functions B) Monitoring computer systems C) Providing security to employees D) Hiring suitable employees
A) 4 B) 6 C) 3 D) 5 E) 2
A) Security education B) Emergency response C) Physical barriers D) Financial auditing
A) Secret B) Restricted C) Top secret D) Confidential
A) Class IV-Non-essential documents B) Class II-important documents C) Class I-Vital documents D) Class III-useful documents
A) 6 B) 5 C) 7 D) 4 E) 8
A) Barangay clearance B) Court clearance C) Municipal clearance D) NBI clearance
A) To check criminal records B) To conduct surveillance C) To verify past employment D) To predict future reactions
A) Competitor analysis B) Criminal investigation only C) Background investigation of potential and current employees D) Market research investigation only
A) Manages employee benefits B) Provide physical protection only C) Protects against unfounded allegations and discrimination D) Offers financial protection
A) Career development B) Security awareness C) Technical skills D) Management training
A) Words or symbols used to differentiate goods B) A government-issued patent C) A secret formula D) A copyright protection
A) Trademark B) Trade secret C) Copyrights D) Patents
A) Counterfeiting B) Piracy C) Misappropriation D) Infringement
A) Restricted B) Top secret C) Secret D) Confidential
A) Background investigation B) Undercover investigation C) Financial and lifestyle inquiry D) Positive vetting
A) Concealed identity B) Public monitoring C) Open surveillance D) Direct questioning
A) NBI clearance B) ISAFP clearance C) Court clearance D) Local clearance
A) To terminate employment B) To issue clearances C) To discover unknown problems D) To process final payments
A) Investigates only external threats B) Investigates market conditions C) Investigates employees suspected of wrongdoing D) Investigates competitor activities
A) Medical screening B) Drug testing only C) Employee hiring screening D) Customer screening
A) To manage inventory B) To maximize profits C) To ensure suitable hiring and protect employees D) To handle public relations
A) Official records B) Maps and overlays C) Letters and diaries D) Orders and manual
A) Class II B) Class IV C) Class III D) Class I
A) They are irreplaceable B) They can cause inconvenience but are replaceable C) They require extensive protection D) They are critical for business recovery
A) Professional security integration B) Personnel security investigation C) Personal safety instruction D) Physical security implementation
A) Entry-level positions B) Management positions C) Sensitive positions D) Technical positions
A) Technical skills B) Discretion C) Morals D) Loyalty
A) To check financial records B) To verify documents C) To evaluate work performance D) To assess truthfulness during interviews
A) Physical fitness B) National security suitability C) Management skills D) Technical competency
A) 2,000 professionals B) 2,500 professional C) 3,000 professional D) 1,500 professional
A) 25 years old B) 33 years old C) 21 years old D) 30 years old E) 23 years old
A) The department of education B) The Philippine National Police C) The national bureau of investigation D) The supervisory office for security and investigation Agency
A) Military operations B) Public law enforcement C) Government intelligence work D) K9 security services
A) July 30,2022 B) July 30 ,2022 C) August 30,2022 D) June 30,2021
A) Must be physically and mentally fit B) Must have a college degree C) Must be of lager age D) Must be Filipino citizen
A) Positive vetting B) Background investigation C) Prowling D) Exit interview
A) Educational background B) Financial stability C) Work experience D) Career progression
A) Background investigation B) Positive vetting C) Undercover investigation D) Prowling
A) Barangay office B) Municipal office C) Local court D) PNP Directorate for intelligence
A) Only physical fitness tests B) Only drug test C) Only neuro -psychiatric D) Both neuro-psychiatric and drug test plus physical and mental fitness
A) The Department of justice B) The chief of the philippine National Police or authorities representative C) The secretary of interior D) The bureau of internal security
A) Wtf B) Restricted C) Private D) Confidential E) Secret |