helurr ismana
  • 1. What is the primary function of a lock?
A) To generate electrical signals
B) To create mechanical resistance
C) To prevent unauthorized entry and removal of items
D) To store digital combinations
  • 2. What distinguishes a padlock from other lock types?
A) It’s permanently attached
B) It’s portable and detachable with a sliding hasp
C) It uses electromagnetic force
D) It requires a digital code
  • 3. What is “Peterman”in English terminology?
A) A lock installation tool
B) A security system designed
C) A lock picker
D) A type of key manufacturer
  • 4. How does a warded lock function?
A) Through biometric scanning
B) Through electromagnetic pulses
C) With digital combinations
D) Using physical obstructions to block incorrect keys
  • 5. What is unique about card-operated locks?
A) They record usage time and user identity
B) They use mechanical tumblers
C) They require physical keys
D) They operate solely on battery power
  • 6. How do electromagnetic locks secure an entry point?
A) With rotating discs
B) Through mechanical pins
C) Using electromagnetic force and an armature plate
D) Through digital keypads only
  • 7. How does a code-operated lock function?
A) By scanning fingerprints
B) Using a sequence of numbers in proper order
C) Through mechanical key insertion
D) Through radio frequency identification
  • 8. What is the primary difference between a grand master key and a master key?
A) A master key works only in emergency situations
B) A grand master key opens all in the building
C) A master key opens all locks in the building
D) A grand master key only works on specific floors
  • 9. What is the purpose of a key cabinet in a key control system?
A) To store maintenance supplies
B) To store original keys for all locks in the system
C) To keep employee records
D) To hold only duplicate keys
  • 10. What should be included in daily reports for key control?
A) Report from the security department
B) Reports from the person responsible for key control in personnel
C) Only lost key incidents
D) Only master key assignments
  • 11. What is the main distinction between a safe and a vault?
A) A vault is portable while a safe is fixed
B) A safe is larger than a vault
C) They serve exactly the same purpose
D) A vault is part of the building structure and more heavily constructed
  • 12. What is required for proper key record management?
A) Annual inventory checks
B) Only tracking master key
C) Weekly audits only
D) Recording lock code numbers and key assignments
  • 13. How often should key control Audits be conducted?
A) Only during annual reviews
B) On a fixed monthly schedule
C) Unannounced and by management
D) Only when key are lost
  • 14. What is required for proper key inventory management?
A) Periodic accounting of all keys issued to employees
B) Annual checks only
C) Daily counts of master keys
D) Weekly safe inspections
  • 15. What is the primary reason personnel security is considered the most important among the three main categories of security?
A) Because it involves physical infrastructure
B) Because it involves people both as assets and potential threats
C) Because it involves financial resources
D) Because it involves technological assets
  • 16. Which of the following is not a key function of personnel security?
A) Developing security awareness among employees
B) Providing background investigation services
C) Managing building access control systems
D) Serving as a screening device in hiring
  • 17. According to the document cycle,what is the first stage in information handling?
A) Storage and Retrieval
B) Classification
C) Creation
D) Transfer
  • 18. Which security classification would be applied to information that could cause “exceptionally grave damage “to the nation if disclosed?
A) Confidential
B) Restricted
C) Secret
D) Top secret
  • 19. Which type of documents are considered irreplaceable and needed to recover cash or replace equipment?
A) Class I-Vital Documents
B) Class III-Useful Documents
C) Class II-Important Documents
D) Class IV-Non-essential Documents
  • 20. What characteristic of information indicates that it can easily expand to cover a scope?
A) Information is costly
B) Information is expansive
C) Information is voluminous
D) Information requires barriers
  • 21. Personnel security investigation(PSI)is defined as ____________?
A) A process of monitoring employee computer usage
B) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty
C) A system of trafficking employee attendance
D) A method of evaluating employee performance
  • 22. During a background investigation (BI),which component is Not typically included?
A) Criminal record
B) Employment history
C) Foreign travel history
D) Social media passwords
  • 23. What is the primary purpose of positive vetting?
A) To inspect with careful thoroughness through personal interviews under stress
B) To verify employment references
C) To monitor employee internet usage
D) To conduct random drug testing
  • 24. Which type of investigation involves placing an agent whose true identity remains unknown?
A) Positive vetting
B) Undercover investigation
C) Exit interview
D) Financial inquiry
  • 25. Which of the following is NOT one of the three security concepts?
A) Training is necessary for the practice of NEED TO KNOW principle
B) Security systems are more important than personnel training
C) Personnel are the weakest link in the security chain
D) Training makes security personnel conscious
  • 26. Under the classification of sensitive information which category would “marketing strategies “fail into?
A) Restricted
B) Private
C) Top secret
D) Secret
  • 27. What color code is associated with “Confidential “classification?
A) Blue
B) White
C) Green
D) Red
  • 28. Which characteristic of information suggests that it’s value can decrease over time?
A) Information is costly
B) Information requires barriers
C) Information is expansive
D) Information has a limited life
  • 29. What aspect of security awareness is emphasized?
A) Financial awareness
B) Technical awareness
C) Development among employees
D) Employee development
  • 30. What is key responsibility regarding allegations against employees ?
A) Immediate termination
B) Protection against unfounded claims
C) Legal prosecution
D) Public disclosure
  • 31. How does personnel security contribute to employee hiring?
A) By conducting performance reviews
B) By managing payroll
C) By serving as a screening device
D) By focusing on technical skills only
  • 32. What is emphasized regarding the system of hiring?
A) Need for establishment
B) Automation of process
C) Cost effectiveness
D) Speed of hiring
  • 33. During the security education program,when are employees typically asked to sign acknowledgment of company policies?
A) During the exit interview
B) During orientation and training
C) During refresher conferences
D) During security promotions
  • 34. Which of the following is NOT a type of national agency check (NAC)?
A) NBI clearance
B) Barangay clearance
C) PNP Directorate for intelligence
D) ISAFP clearance
  • 35. What is the purpose of an exit interview in personnel security?
A) To conduct final performance evaluation
B) To collect company property
C) To issue final paycheck
D) To give departing employees an opportunity to list grievances
  • 36. What is prowling in the personnel security?
A) Random security checks of employee workstations
B) Monitoring of employee communications
C) Predicting subject’s reactions in future critical situations through behavior observation
D) Physical surveillance of employees
  • 37. What is one of the main purposes of protecting classified materials?
A) To increase office efficiency
B) To reduce storage costs
C) To deter and impede potential spies
D) To simplify document sharing
  • 38. What can be protected under copyright law?
A) Manufacturing processes only
B) Original literary and musical work
C) Business methods only
D) Customer database only
  • 39. What is considered the most important among the three main categories of security?
A) Personnel security
B) Physical security
C) Information security
D) Technological security
  • 40. Why is personnel security considered most crucial?
A) It requires less oversight
B) It is easier to implement than other security measures
C) It requires the most financial investment
D) It involves protecting both assets and managing human threats
  • 41. What is the Latin origin of the word “Document “ and what does it denote?
A) Documenta-written proof
B) Documentum-teaching or lesson
C) Doctrina-teaching method
D) Docere-to show
  • 42. Which color code is associated with “Top secret “classified matter?
A) White
B) Green
C) Blue
D) Red
  • 43. What type of documents are considered Class Vital Documents?
A) Documents that are routine in nature
B) Documents that are replaceable with some effort
C) Documents that are irreplaceable and critical for recovery
D) Documents that cause minor inconvenience if lost
  • 44. Which classification of sensitive information relates specifically to employees?
A) Secret
B) Top secret
C) Private
D) Restricted
E) Confidential
  • 45. What type of activities are mentioned regarding employee misconduct?
A) Attendance problems
B) Time management issues
C) Only external threats
D) Theft and sabotage
  • 46. What approach to security is highlighted regarding employees?
A) Comprehensive approach to protection and screening
B) Financial approach
C) Technological approach
D) Reactive approach only
  • 47. What is a major source of losses?
A) External theft
B) Natural disasters
C) Employee negligence or participation in theft
D) Technology failures
  • 48. What is NOT mentioned as a purpose of personnel security?
A) Hiring suitable employees
B) Providing security to employees
C) Monitoring computer systems
D) Supporting employee functions
  • 49. How many key functions of personnel security are listed?
A) 2
B) 3
C) 6
D) 5
E) 4
  • 50. Which aspect is included in the scope of personnel security?
A) Physical barriers
B) Financial auditing
C) Security education
D) Emergency response
  • 51. Which type of classified matter would cause “exceptionally grave damage “to the nation if disclosed?
A) Restricted
B) Confidential
C) Top secret
D) Secret
  • 52. Which category of documents represents the bulk of records that need be protected in case of disaster?
A) Class III-useful documents
B) Class I-Vital documents
C) Class II-important documents
D) Class IV-Non-essential documents
  • 53. How many factors are primarily considered in conducting a background investigation?
A) 6
B) 4
C) 5
D) 8
E) 7
  • 54. Which is NOT a type of local agency check (LAC)?
A) NBI clearance
B) Barangay clearance
C) Municipal clearance
D) Court clearance
  • 55. What is the purpose of prowling in personnel security?
A) To predict future reactions
B) To conduct surveillance
C) To check criminal records
D) To verify past employment
  • 56. What type of investigation service does personnel security provide?
A) Market research investigation only
B) Competitor analysis
C) Background investigation of potential and current employees
D) Criminal investigation only
  • 57. What role does personnel security play in employee protection?
A) Provide physical protection only
B) Protects against unfounded allegations and discrimination
C) Offers financial protection
D) Manages employee benefits
  • 58. What developmental aspect does personnel security handle?
A) Career development
B) Security awareness
C) Technical skills
D) Management training
  • 59. What is a trademark?
A) A copyright protection
B) Words or symbols used to differentiate goods
C) A secret formula
D) A government-issued patent
  • 60. Which intellectual property protection is given to creators of original literary works?
A) Trade secret
B) Copyrights
C) Trademark
D) Patents
  • 61. What constitutes a trade secret violation in legal terms?
A) Piracy
B) Infringement
C) Misappropriation
D) Counterfeiting
  • 62. Which classified matter category uses red as its color code ?
A) Confidential
B) Restricted
C) Secret
D) Top secret
  • 63. Which investigation type focuses on income and mode of living?
A) Background investigation
B) Undercover investigation
C) Financial and lifestyle inquiry
D) Positive vetting
  • 64. What is a key characteristic of undercover investigation?
A) Direct questioning
B) Open surveillance
C) Concealed identity
D) Public monitoring
  • 65. Which National Agency Check (NAC)is related to military intelligence?
A) ISAFP clearance
B) Local clearance
C) NBI clearance
D) Court clearance
  • 66. What is the primary benefit of conducting exit interviews?
A) To terminate employment
B) To process final payments
C) To discover unknown problems
D) To issue clearances
  • 67. What investigative functions does personnel security serve?
A) Investigates market conditions
B) Investigates employees suspected of wrongdoing
C) Investigates competitor activities
D) Investigates only external threats
  • 68. What screening function does personnel security provide?
A) Employee hiring screening
B) Medical screening
C) Drug testing only
D) Customer screening
  • 69. What is one of the dual purposes of personnel security?
A) To maximize profits
B) To manage inventory
C) To ensure suitable hiring and protect employees
D) To handle public relations
  • 70. What type of documents are personal documents?
A) Letters and diaries
B) Maps and overlays
C) Orders and manual
D) Official records
  • 71. Which document class includes records whose reproduction requires considerable expense and labor?
A) Class III
B) Class II
C) Class I
D) Class IV
  • 72. What is the primary characteristic of class III -useful documents?
A) They are irreplaceable
B) They can cause inconvenience but are replaceable
C) They are critical for business recovery
D) They require extensive protection
  • 73. What element is part of PSI mentioned in the scope?
A) Personnel security investigation
B) Personal safety instruction
C) Physical security implementation
D) Professional security integration
  • 74. What type of position is specifically mentioned regarding background investigation?
A) Technical positions
B) Entry-level positions
C) Management positions
D) Sensitive positions
  • 75. Which factor is NOT considered in background investigation?
A) Discretion
B) Morals
C) Loyalty
D) Technical skills
  • 76. What is the purpose of deception detection techniques?
A) To assess truthfulness during interviews
B) To evaluate work performance
C) To check financial records
D) To verify documents
  • 77. What is positive vetting primarily used to assess?
A) National security suitability
B) Technical competency
C) Management skills
D) Physical fitness
  • 78. According to RA 11917,what is the maximum number of private security professionals that a private security Agency (PSA)can employ?
A) 3,000 professional
B) 2,000 professionals
C) 1,500 professional
D) 2,500 professional
  • 79. What is the minimum age requirement for a PSA operator or license?
A) 25 years old
B) 30 years old
C) 23 years old
D) 21 years old
E) 33 years old
  • 80. Who is responsible for issuing the letter of authority to conduct training for LESP? a the Philippine National Police?
A) The national bureau of investigation
B) The Philippine National Police
C) The department of education
D) The supervisory office for security and investigation Agency
  • 81. Which of the following services falls under the private security industry?
A) Military operations
B) Government intelligence work
C) Public law enforcement
D) K9 security services
  • 82. When did RA 11917 take effect?
A) August 30,2022
B) June 30,2021
C) July 30,2022
D) July 30 ,2022
  • 83. Which of the following is NOT a basic qualification requirement for obtaining an LESP?
A) Must be Filipino citizen
B) Must have a college degree
C) Must be physically and mentally fit
D) Must be of lager age
  • 84. Which investigation method use’s questionnaire like honesty test?
A) Prowling
B) Positive vetting
C) Exit interview
D) Background investigation
  • 85. What aspect does the earning -to debt ratio analyze?
A) Financial stability
B) Career progression
C) Educational background
D) Work experience
  • 86. What type of investigation involves placing an agent in an unknown role?
A) Positive vetting
B) Undercover investigation
C) Background investigation
D) Prowling
  • 87. Which agency is part of the national agency check (NAC)?
A) PNP Directorate for intelligence
B) Municipal office
C) Barangay office
D) Local court
  • 88. What health-related requirements must a PSA operator meet?
A) Only physical fitness tests
B) Only neuro -psychiatric
C) Both neuro-psychiatric and drug test plus physical and mental fitness
D) Only drug test
  • 89. Who has the authority to issue a license to operate (LTO)?
A) The bureau of internal security
B) The chief of the philippine National Police or authorities representative
C) The Department of justice
D) The secretary of interior
  • 90. Which sensitive information classification has strictly limited use and access?
A) Confidential
B) Restricted
C) Private
D) Wtf
E) Secret
Created with That Quiz — where a math practice test is always one click away.