helurr ismana
  • 1. What is the primary function of a lock?
A) To create mechanical resistance
B) To generate electrical signals
C) To prevent unauthorized entry and removal of items
D) To store digital combinations
  • 2. What distinguishes a padlock from other lock types?
A) It uses electromagnetic force
B) It’s portable and detachable with a sliding hasp
C) It’s permanently attached
D) It requires a digital code
  • 3. What is “Peterman”in English terminology?
A) A lock picker
B) A security system designed
C) A type of key manufacturer
D) A lock installation tool
  • 4. How does a warded lock function?
A) Through electromagnetic pulses
B) Through biometric scanning
C) With digital combinations
D) Using physical obstructions to block incorrect keys
  • 5. What is unique about card-operated locks?
A) They record usage time and user identity
B) They operate solely on battery power
C) They use mechanical tumblers
D) They require physical keys
  • 6. How do electromagnetic locks secure an entry point?
A) Using electromagnetic force and an armature plate
B) Through digital keypads only
C) With rotating discs
D) Through mechanical pins
  • 7. How does a code-operated lock function?
A) Through radio frequency identification
B) Using a sequence of numbers in proper order
C) Through mechanical key insertion
D) By scanning fingerprints
  • 8. What is the primary difference between a grand master key and a master key?
A) A master key opens all locks in the building
B) A master key works only in emergency situations
C) A grand master key opens all in the building
D) A grand master key only works on specific floors
  • 9. What is the purpose of a key cabinet in a key control system?
A) To store maintenance supplies
B) To hold only duplicate keys
C) To keep employee records
D) To store original keys for all locks in the system
  • 10. What should be included in daily reports for key control?
A) Only master key assignments
B) Reports from the person responsible for key control in personnel
C) Only lost key incidents
D) Report from the security department
  • 11. What is the main distinction between a safe and a vault?
A) They serve exactly the same purpose
B) A safe is larger than a vault
C) A vault is part of the building structure and more heavily constructed
D) A vault is portable while a safe is fixed
  • 12. What is required for proper key record management?
A) Only tracking master key
B) Annual inventory checks
C) Weekly audits only
D) Recording lock code numbers and key assignments
  • 13. How often should key control Audits be conducted?
A) On a fixed monthly schedule
B) Only during annual reviews
C) Only when key are lost
D) Unannounced and by management
  • 14. What is required for proper key inventory management?
A) Periodic accounting of all keys issued to employees
B) Annual checks only
C) Daily counts of master keys
D) Weekly safe inspections
  • 15. What is the primary reason personnel security is considered the most important among the three main categories of security?
A) Because it involves technological assets
B) Because it involves people both as assets and potential threats
C) Because it involves physical infrastructure
D) Because it involves financial resources
  • 16. Which of the following is not a key function of personnel security?
A) Developing security awareness among employees
B) Serving as a screening device in hiring
C) Providing background investigation services
D) Managing building access control systems
  • 17. According to the document cycle,what is the first stage in information handling?
A) Storage and Retrieval
B) Transfer
C) Creation
D) Classification
  • 18. Which security classification would be applied to information that could cause “exceptionally grave damage “to the nation if disclosed?
A) Secret
B) Restricted
C) Top secret
D) Confidential
  • 19. Which type of documents are considered irreplaceable and needed to recover cash or replace equipment?
A) Class II-Important Documents
B) Class I-Vital Documents
C) Class IV-Non-essential Documents
D) Class III-Useful Documents
  • 20. What characteristic of information indicates that it can easily expand to cover a scope?
A) Information is costly
B) Information requires barriers
C) Information is expansive
D) Information is voluminous
  • 21. Personnel security investigation(PSI)is defined as ____________?
A) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty
B) A method of evaluating employee performance
C) A system of trafficking employee attendance
D) A process of monitoring employee computer usage
  • 22. During a background investigation (BI),which component is Not typically included?
A) Employment history
B) Foreign travel history
C) Social media passwords
D) Criminal record
  • 23. What is the primary purpose of positive vetting?
A) To inspect with careful thoroughness through personal interviews under stress
B) To monitor employee internet usage
C) To verify employment references
D) To conduct random drug testing
  • 24. Which type of investigation involves placing an agent whose true identity remains unknown?
A) Exit interview
B) Positive vetting
C) Financial inquiry
D) Undercover investigation
  • 25. Which of the following is NOT one of the three security concepts?
A) Training makes security personnel conscious
B) Security systems are more important than personnel training
C) Training is necessary for the practice of NEED TO KNOW principle
D) Personnel are the weakest link in the security chain
  • 26. Under the classification of sensitive information which category would “marketing strategies “fail into?
A) Private
B) Restricted
C) Secret
D) Top secret
  • 27. What color code is associated with “Confidential “classification?
A) Red
B) Green
C) White
D) Blue
  • 28. Which characteristic of information suggests that it’s value can decrease over time?
A) Information is expansive
B) Information requires barriers
C) Information has a limited life
D) Information is costly
  • 29. What aspect of security awareness is emphasized?
A) Development among employees
B) Financial awareness
C) Employee development
D) Technical awareness
  • 30. What is key responsibility regarding allegations against employees ?
A) Legal prosecution
B) Immediate termination
C) Protection against unfounded claims
D) Public disclosure
  • 31. How does personnel security contribute to employee hiring?
A) By conducting performance reviews
B) By serving as a screening device
C) By focusing on technical skills only
D) By managing payroll
  • 32. What is emphasized regarding the system of hiring?
A) Speed of hiring
B) Automation of process
C) Cost effectiveness
D) Need for establishment
  • 33. During the security education program,when are employees typically asked to sign acknowledgment of company policies?
A) During orientation and training
B) During the exit interview
C) During refresher conferences
D) During security promotions
  • 34. Which of the following is NOT a type of national agency check (NAC)?
A) NBI clearance
B) Barangay clearance
C) ISAFP clearance
D) PNP Directorate for intelligence
  • 35. What is the purpose of an exit interview in personnel security?
A) To give departing employees an opportunity to list grievances
B) To issue final paycheck
C) To conduct final performance evaluation
D) To collect company property
  • 36. What is prowling in the personnel security?
A) Predicting subject’s reactions in future critical situations through behavior observation
B) Physical surveillance of employees
C) Random security checks of employee workstations
D) Monitoring of employee communications
  • 37. What is one of the main purposes of protecting classified materials?
A) To deter and impede potential spies
B) To increase office efficiency
C) To reduce storage costs
D) To simplify document sharing
  • 38. What can be protected under copyright law?
A) Manufacturing processes only
B) Original literary and musical work
C) Customer database only
D) Business methods only
  • 39. What is considered the most important among the three main categories of security?
A) Personnel security
B) Physical security
C) Information security
D) Technological security
  • 40. Why is personnel security considered most crucial?
A) It is easier to implement than other security measures
B) It requires less oversight
C) It involves protecting both assets and managing human threats
D) It requires the most financial investment
  • 41. What is the Latin origin of the word “Document “ and what does it denote?
A) Documentum-teaching or lesson
B) Docere-to show
C) Doctrina-teaching method
D) Documenta-written proof
  • 42. Which color code is associated with “Top secret “classified matter?
A) Green
B) White
C) Red
D) Blue
  • 43. What type of documents are considered Class Vital Documents?
A) Documents that are routine in nature
B) Documents that are irreplaceable and critical for recovery
C) Documents that are replaceable with some effort
D) Documents that cause minor inconvenience if lost
  • 44. Which classification of sensitive information relates specifically to employees?
A) Secret
B) Restricted
C) Confidential
D) Top secret
E) Private
  • 45. What type of activities are mentioned regarding employee misconduct?
A) Time management issues
B) Attendance problems
C) Only external threats
D) Theft and sabotage
  • 46. What approach to security is highlighted regarding employees?
A) Financial approach
B) Technological approach
C) Comprehensive approach to protection and screening
D) Reactive approach only
  • 47. What is a major source of losses?
A) Natural disasters
B) Technology failures
C) Employee negligence or participation in theft
D) External theft
  • 48. What is NOT mentioned as a purpose of personnel security?
A) Supporting employee functions
B) Monitoring computer systems
C) Providing security to employees
D) Hiring suitable employees
  • 49. How many key functions of personnel security are listed?
A) 4
B) 6
C) 3
D) 5
E) 2
  • 50. Which aspect is included in the scope of personnel security?
A) Security education
B) Emergency response
C) Physical barriers
D) Financial auditing
  • 51. Which type of classified matter would cause “exceptionally grave damage “to the nation if disclosed?
A) Secret
B) Restricted
C) Top secret
D) Confidential
  • 52. Which category of documents represents the bulk of records that need be protected in case of disaster?
A) Class IV-Non-essential documents
B) Class II-important documents
C) Class I-Vital documents
D) Class III-useful documents
  • 53. How many factors are primarily considered in conducting a background investigation?
A) 6
B) 5
C) 7
D) 4
E) 8
  • 54. Which is NOT a type of local agency check (LAC)?
A) Barangay clearance
B) Court clearance
C) Municipal clearance
D) NBI clearance
  • 55. What is the purpose of prowling in personnel security?
A) To check criminal records
B) To conduct surveillance
C) To verify past employment
D) To predict future reactions
  • 56. What type of investigation service does personnel security provide?
A) Competitor analysis
B) Criminal investigation only
C) Background investigation of potential and current employees
D) Market research investigation only
  • 57. What role does personnel security play in employee protection?
A) Manages employee benefits
B) Provide physical protection only
C) Protects against unfounded allegations and discrimination
D) Offers financial protection
  • 58. What developmental aspect does personnel security handle?
A) Career development
B) Security awareness
C) Technical skills
D) Management training
  • 59. What is a trademark?
A) Words or symbols used to differentiate goods
B) A government-issued patent
C) A secret formula
D) A copyright protection
  • 60. Which intellectual property protection is given to creators of original literary works?
A) Trademark
B) Trade secret
C) Copyrights
D) Patents
  • 61. What constitutes a trade secret violation in legal terms?
A) Counterfeiting
B) Piracy
C) Misappropriation
D) Infringement
  • 62. Which classified matter category uses red as its color code ?
A) Restricted
B) Top secret
C) Secret
D) Confidential
  • 63. Which investigation type focuses on income and mode of living?
A) Background investigation
B) Undercover investigation
C) Financial and lifestyle inquiry
D) Positive vetting
  • 64. What is a key characteristic of undercover investigation?
A) Concealed identity
B) Public monitoring
C) Open surveillance
D) Direct questioning
  • 65. Which National Agency Check (NAC)is related to military intelligence?
A) NBI clearance
B) ISAFP clearance
C) Court clearance
D) Local clearance
  • 66. What is the primary benefit of conducting exit interviews?
A) To terminate employment
B) To issue clearances
C) To discover unknown problems
D) To process final payments
  • 67. What investigative functions does personnel security serve?
A) Investigates only external threats
B) Investigates market conditions
C) Investigates employees suspected of wrongdoing
D) Investigates competitor activities
  • 68. What screening function does personnel security provide?
A) Medical screening
B) Drug testing only
C) Employee hiring screening
D) Customer screening
  • 69. What is one of the dual purposes of personnel security?
A) To manage inventory
B) To maximize profits
C) To ensure suitable hiring and protect employees
D) To handle public relations
  • 70. What type of documents are personal documents?
A) Official records
B) Maps and overlays
C) Letters and diaries
D) Orders and manual
  • 71. Which document class includes records whose reproduction requires considerable expense and labor?
A) Class II
B) Class IV
C) Class III
D) Class I
  • 72. What is the primary characteristic of class III -useful documents?
A) They are irreplaceable
B) They can cause inconvenience but are replaceable
C) They require extensive protection
D) They are critical for business recovery
  • 73. What element is part of PSI mentioned in the scope?
A) Professional security integration
B) Personnel security investigation
C) Personal safety instruction
D) Physical security implementation
  • 74. What type of position is specifically mentioned regarding background investigation?
A) Entry-level positions
B) Management positions
C) Sensitive positions
D) Technical positions
  • 75. Which factor is NOT considered in background investigation?
A) Technical skills
B) Discretion
C) Morals
D) Loyalty
  • 76. What is the purpose of deception detection techniques?
A) To check financial records
B) To verify documents
C) To evaluate work performance
D) To assess truthfulness during interviews
  • 77. What is positive vetting primarily used to assess?
A) Physical fitness
B) National security suitability
C) Management skills
D) Technical competency
  • 78. According to RA 11917,what is the maximum number of private security professionals that a private security Agency (PSA)can employ?
A) 2,000 professionals
B) 2,500 professional
C) 3,000 professional
D) 1,500 professional
  • 79. What is the minimum age requirement for a PSA operator or license?
A) 25 years old
B) 33 years old
C) 21 years old
D) 30 years old
E) 23 years old
  • 80. Who is responsible for issuing the letter of authority to conduct training for LESP? a the Philippine National Police?
A) The department of education
B) The Philippine National Police
C) The national bureau of investigation
D) The supervisory office for security and investigation Agency
  • 81. Which of the following services falls under the private security industry?
A) Military operations
B) Public law enforcement
C) Government intelligence work
D) K9 security services
  • 82. When did RA 11917 take effect?
A) July 30,2022
B) July 30 ,2022
C) August 30,2022
D) June 30,2021
  • 83. Which of the following is NOT a basic qualification requirement for obtaining an LESP?
A) Must be physically and mentally fit
B) Must have a college degree
C) Must be of lager age
D) Must be Filipino citizen
  • 84. Which investigation method use’s questionnaire like honesty test?
A) Positive vetting
B) Background investigation
C) Prowling
D) Exit interview
  • 85. What aspect does the earning -to debt ratio analyze?
A) Educational background
B) Financial stability
C) Work experience
D) Career progression
  • 86. What type of investigation involves placing an agent in an unknown role?
A) Background investigation
B) Positive vetting
C) Undercover investigation
D) Prowling
  • 87. Which agency is part of the national agency check (NAC)?
A) Barangay office
B) Municipal office
C) Local court
D) PNP Directorate for intelligence
  • 88. What health-related requirements must a PSA operator meet?
A) Only physical fitness tests
B) Only drug test
C) Only neuro -psychiatric
D) Both neuro-psychiatric and drug test plus physical and mental fitness
  • 89. Who has the authority to issue a license to operate (LTO)?
A) The Department of justice
B) The chief of the philippine National Police or authorities representative
C) The secretary of interior
D) The bureau of internal security
  • 90. Which sensitive information classification has strictly limited use and access?
A) Wtf
B) Restricted
C) Private
D) Confidential
E) Secret
Created with That Quiz — where a math practice test is always one click away.