A) To generate electrical signals B) To create mechanical resistance C) To prevent unauthorized entry and removal of items D) To store digital combinations
A) It’s permanently attached B) It’s portable and detachable with a sliding hasp C) It uses electromagnetic force D) It requires a digital code
A) A lock installation tool B) A security system designed C) A lock picker D) A type of key manufacturer
A) Through biometric scanning B) Through electromagnetic pulses C) With digital combinations D) Using physical obstructions to block incorrect keys
A) They record usage time and user identity B) They use mechanical tumblers C) They require physical keys D) They operate solely on battery power
A) With rotating discs B) Through mechanical pins C) Using electromagnetic force and an armature plate D) Through digital keypads only
A) By scanning fingerprints B) Using a sequence of numbers in proper order C) Through mechanical key insertion D) Through radio frequency identification
A) A master key works only in emergency situations B) A grand master key opens all in the building C) A master key opens all locks in the building D) A grand master key only works on specific floors
A) To store maintenance supplies B) To store original keys for all locks in the system C) To keep employee records D) To hold only duplicate keys
A) Report from the security department B) Reports from the person responsible for key control in personnel C) Only lost key incidents D) Only master key assignments
A) A vault is portable while a safe is fixed B) A safe is larger than a vault C) They serve exactly the same purpose D) A vault is part of the building structure and more heavily constructed
A) Annual inventory checks B) Only tracking master key C) Weekly audits only D) Recording lock code numbers and key assignments
A) Only during annual reviews B) On a fixed monthly schedule C) Unannounced and by management D) Only when key are lost
A) Periodic accounting of all keys issued to employees B) Annual checks only C) Daily counts of master keys D) Weekly safe inspections
A) Because it involves physical infrastructure B) Because it involves people both as assets and potential threats C) Because it involves financial resources D) Because it involves technological assets
A) Developing security awareness among employees B) Providing background investigation services C) Managing building access control systems D) Serving as a screening device in hiring
A) Storage and Retrieval B) Classification C) Creation D) Transfer
A) Confidential B) Restricted C) Secret D) Top secret
A) Class I-Vital Documents B) Class III-Useful Documents C) Class II-Important Documents D) Class IV-Non-essential Documents
A) Information is costly B) Information is expansive C) Information is voluminous D) Information requires barriers
A) A process of monitoring employee computer usage B) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty C) A system of trafficking employee attendance D) A method of evaluating employee performance
A) Criminal record B) Employment history C) Foreign travel history D) Social media passwords
A) To inspect with careful thoroughness through personal interviews under stress B) To verify employment references C) To monitor employee internet usage D) To conduct random drug testing
A) Positive vetting B) Undercover investigation C) Exit interview D) Financial inquiry
A) Training is necessary for the practice of NEED TO KNOW principle B) Security systems are more important than personnel training C) Personnel are the weakest link in the security chain D) Training makes security personnel conscious
A) Restricted B) Private C) Top secret D) Secret
A) Blue B) White C) Green D) Red
A) Information is costly B) Information requires barriers C) Information is expansive D) Information has a limited life
A) Financial awareness B) Technical awareness C) Development among employees D) Employee development
A) Immediate termination B) Protection against unfounded claims C) Legal prosecution D) Public disclosure
A) By conducting performance reviews B) By managing payroll C) By serving as a screening device D) By focusing on technical skills only
A) Need for establishment B) Automation of process C) Cost effectiveness D) Speed of hiring
A) During the exit interview B) During orientation and training C) During refresher conferences D) During security promotions
A) NBI clearance B) Barangay clearance C) PNP Directorate for intelligence D) ISAFP clearance
A) To conduct final performance evaluation B) To collect company property C) To issue final paycheck D) To give departing employees an opportunity to list grievances
A) Random security checks of employee workstations B) Monitoring of employee communications C) Predicting subject’s reactions in future critical situations through behavior observation D) Physical surveillance of employees
A) To increase office efficiency B) To reduce storage costs C) To deter and impede potential spies D) To simplify document sharing
A) Manufacturing processes only B) Original literary and musical work C) Business methods only D) Customer database only
A) Personnel security B) Physical security C) Information security D) Technological security
A) It requires less oversight B) It is easier to implement than other security measures C) It requires the most financial investment D) It involves protecting both assets and managing human threats
A) Documenta-written proof B) Documentum-teaching or lesson C) Doctrina-teaching method D) Docere-to show
A) White B) Green C) Blue D) Red
A) Documents that are routine in nature B) Documents that are replaceable with some effort C) Documents that are irreplaceable and critical for recovery D) Documents that cause minor inconvenience if lost
A) Secret B) Top secret C) Private D) Restricted E) Confidential
A) Attendance problems B) Time management issues C) Only external threats D) Theft and sabotage
A) Comprehensive approach to protection and screening B) Financial approach C) Technological approach D) Reactive approach only
A) External theft B) Natural disasters C) Employee negligence or participation in theft D) Technology failures
A) Hiring suitable employees B) Providing security to employees C) Monitoring computer systems D) Supporting employee functions
A) 2 B) 3 C) 6 D) 5 E) 4
A) Physical barriers B) Financial auditing C) Security education D) Emergency response
A) Restricted B) Confidential C) Top secret D) Secret
A) Class III-useful documents B) Class I-Vital documents C) Class II-important documents D) Class IV-Non-essential documents
A) 6 B) 4 C) 5 D) 8 E) 7
A) NBI clearance B) Barangay clearance C) Municipal clearance D) Court clearance
A) To predict future reactions B) To conduct surveillance C) To check criminal records D) To verify past employment
A) Market research investigation only B) Competitor analysis C) Background investigation of potential and current employees D) Criminal investigation only
A) Provide physical protection only B) Protects against unfounded allegations and discrimination C) Offers financial protection D) Manages employee benefits
A) Career development B) Security awareness C) Technical skills D) Management training
A) A copyright protection B) Words or symbols used to differentiate goods C) A secret formula D) A government-issued patent
A) Trade secret B) Copyrights C) Trademark D) Patents
A) Piracy B) Infringement C) Misappropriation D) Counterfeiting
A) Confidential B) Restricted C) Secret D) Top secret
A) Background investigation B) Undercover investigation C) Financial and lifestyle inquiry D) Positive vetting
A) Direct questioning B) Open surveillance C) Concealed identity D) Public monitoring
A) ISAFP clearance B) Local clearance C) NBI clearance D) Court clearance
A) To terminate employment B) To process final payments C) To discover unknown problems D) To issue clearances
A) Investigates market conditions B) Investigates employees suspected of wrongdoing C) Investigates competitor activities D) Investigates only external threats
A) Employee hiring screening B) Medical screening C) Drug testing only D) Customer screening
A) To maximize profits B) To manage inventory C) To ensure suitable hiring and protect employees D) To handle public relations
A) Letters and diaries B) Maps and overlays C) Orders and manual D) Official records
A) Class III B) Class II C) Class I D) Class IV
A) They are irreplaceable B) They can cause inconvenience but are replaceable C) They are critical for business recovery D) They require extensive protection
A) Personnel security investigation B) Personal safety instruction C) Physical security implementation D) Professional security integration
A) Technical positions B) Entry-level positions C) Management positions D) Sensitive positions
A) Discretion B) Morals C) Loyalty D) Technical skills
A) To assess truthfulness during interviews B) To evaluate work performance C) To check financial records D) To verify documents
A) National security suitability B) Technical competency C) Management skills D) Physical fitness
A) 3,000 professional B) 2,000 professionals C) 1,500 professional D) 2,500 professional
A) 25 years old B) 30 years old C) 23 years old D) 21 years old E) 33 years old
A) The national bureau of investigation B) The Philippine National Police C) The department of education D) The supervisory office for security and investigation Agency
A) Military operations B) Government intelligence work C) Public law enforcement D) K9 security services
A) August 30,2022 B) June 30,2021 C) July 30,2022 D) July 30 ,2022
A) Must be Filipino citizen B) Must have a college degree C) Must be physically and mentally fit D) Must be of lager age
A) Prowling B) Positive vetting C) Exit interview D) Background investigation
A) Financial stability B) Career progression C) Educational background D) Work experience
A) Positive vetting B) Undercover investigation C) Background investigation D) Prowling
A) PNP Directorate for intelligence B) Municipal office C) Barangay office D) Local court
A) Only physical fitness tests B) Only neuro -psychiatric C) Both neuro-psychiatric and drug test plus physical and mental fitness D) Only drug test
A) The bureau of internal security B) The chief of the philippine National Police or authorities representative C) The Department of justice D) The secretary of interior
A) Confidential B) Restricted C) Private D) Wtf E) Secret |