A) To generate electrical signals B) To create mechanical resistance C) To store digital combinations D) To prevent unauthorized entry and removal of items
A) It requires a digital code B) It uses electromagnetic force C) It’s permanently attached D) It’s portable and detachable with a sliding hasp
A) A security system designed B) A lock picker C) A lock installation tool D) A type of key manufacturer
A) Using physical obstructions to block incorrect keys B) With digital combinations C) Through biometric scanning D) Through electromagnetic pulses
A) They use mechanical tumblers B) They require physical keys C) They record usage time and user identity D) They operate solely on battery power
A) Through mechanical pins B) With rotating discs C) Through digital keypads only D) Using electromagnetic force and an armature plate
A) Through radio frequency identification B) By scanning fingerprints C) Using a sequence of numbers in proper order D) Through mechanical key insertion
A) A master key opens all locks in the building B) A grand master key only works on specific floors C) A grand master key opens all in the building D) A master key works only in emergency situations
A) To hold only duplicate keys B) To keep employee records C) To store maintenance supplies D) To store original keys for all locks in the system
A) Only master key assignments B) Only lost key incidents C) Reports from the person responsible for key control in personnel D) Report from the security department
A) A vault is portable while a safe is fixed B) They serve exactly the same purpose C) A vault is part of the building structure and more heavily constructed D) A safe is larger than a vault
A) Only tracking master key B) Weekly audits only C) Recording lock code numbers and key assignments D) Annual inventory checks
A) Only when key are lost B) On a fixed monthly schedule C) Unannounced and by management D) Only during annual reviews
A) Daily counts of master keys B) Periodic accounting of all keys issued to employees C) Annual checks only D) Weekly safe inspections
A) Because it involves financial resources B) Because it involves people both as assets and potential threats C) Because it involves technological assets D) Because it involves physical infrastructure
A) Managing building access control systems B) Developing security awareness among employees C) Serving as a screening device in hiring D) Providing background investigation services
A) Creation B) Storage and Retrieval C) Classification D) Transfer
A) Secret B) Confidential C) Top secret D) Restricted
A) Class III-Useful Documents B) Class I-Vital Documents C) Class IV-Non-essential Documents D) Class II-Important Documents
A) Information requires barriers B) Information is expansive C) Information is costly D) Information is voluminous
A) A method of evaluating employee performance B) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty C) A process of monitoring employee computer usage D) A system of trafficking employee attendance
A) Social media passwords B) Foreign travel history C) Employment history D) Criminal record
A) To inspect with careful thoroughness through personal interviews under stress B) To monitor employee internet usage C) To verify employment references D) To conduct random drug testing
A) Exit interview B) Financial inquiry C) Undercover investigation D) Positive vetting
A) Personnel are the weakest link in the security chain B) Training makes security personnel conscious C) Security systems are more important than personnel training D) Training is necessary for the practice of NEED TO KNOW principle
A) Private B) Top secret C) Restricted D) Secret
A) Green B) Red C) Blue D) White
A) Information requires barriers B) Information has a limited life C) Information is costly D) Information is expansive
A) Technical awareness B) Employee development C) Financial awareness D) Development among employees
A) Public disclosure B) Protection against unfounded claims C) Immediate termination D) Legal prosecution
A) By serving as a screening device B) By focusing on technical skills only C) By conducting performance reviews D) By managing payroll
A) Need for establishment B) Speed of hiring C) Automation of process D) Cost effectiveness
A) During security promotions B) During the exit interview C) During refresher conferences D) During orientation and training
A) ISAFP clearance B) NBI clearance C) Barangay clearance D) PNP Directorate for intelligence
A) To give departing employees an opportunity to list grievances B) To conduct final performance evaluation C) To collect company property D) To issue final paycheck
A) Predicting subject’s reactions in future critical situations through behavior observation B) Physical surveillance of employees C) Random security checks of employee workstations D) Monitoring of employee communications
A) To increase office efficiency B) To deter and impede potential spies C) To reduce storage costs D) To simplify document sharing
A) Manufacturing processes only B) Business methods only C) Original literary and musical work D) Customer database only
A) Technological security B) Information security C) Personnel security D) Physical security
A) It requires the most financial investment B) It requires less oversight C) It is easier to implement than other security measures D) It involves protecting both assets and managing human threats
A) Documenta-written proof B) Doctrina-teaching method C) Docere-to show D) Documentum-teaching or lesson
A) Blue B) White C) Green D) Red
A) Documents that cause minor inconvenience if lost B) Documents that are irreplaceable and critical for recovery C) Documents that are routine in nature D) Documents that are replaceable with some effort
A) Confidential B) Restricted C) Secret D) Top secret E) Private
A) Attendance problems B) Only external threats C) Time management issues D) Theft and sabotage
A) Comprehensive approach to protection and screening B) Financial approach C) Technological approach D) Reactive approach only
A) Technology failures B) External theft C) Natural disasters D) Employee negligence or participation in theft
A) Supporting employee functions B) Hiring suitable employees C) Providing security to employees D) Monitoring computer systems
A) 2 B) 5 C) 3 D) 6 E) 4
A) Financial auditing B) Physical barriers C) Emergency response D) Security education
A) Restricted B) Secret C) Confidential D) Top secret
A) Class I-Vital documents B) Class III-useful documents C) Class IV-Non-essential documents D) Class II-important documents
A) 8 B) 6 C) 4 D) 7 E) 5
A) Barangay clearance B) Court clearance C) NBI clearance D) Municipal clearance
A) To check criminal records B) To predict future reactions C) To verify past employment D) To conduct surveillance
A) Background investigation of potential and current employees B) Criminal investigation only C) Market research investigation only D) Competitor analysis
A) Offers financial protection B) Protects against unfounded allegations and discrimination C) Provide physical protection only D) Manages employee benefits
A) Career development B) Technical skills C) Security awareness D) Management training
A) Words or symbols used to differentiate goods B) A government-issued patent C) A copyright protection D) A secret formula
A) Trade secret B) Copyrights C) Trademark D) Patents
A) Misappropriation B) Counterfeiting C) Infringement D) Piracy
A) Confidential B) Secret C) Restricted D) Top secret
A) Background investigation B) Positive vetting C) Undercover investigation D) Financial and lifestyle inquiry
A) Public monitoring B) Open surveillance C) Concealed identity D) Direct questioning
A) ISAFP clearance B) Local clearance C) Court clearance D) NBI clearance
A) To process final payments B) To discover unknown problems C) To issue clearances D) To terminate employment
A) Investigates employees suspected of wrongdoing B) Investigates competitor activities C) Investigates market conditions D) Investigates only external threats
A) Medical screening B) Employee hiring screening C) Customer screening D) Drug testing only
A) To handle public relations B) To maximize profits C) To manage inventory D) To ensure suitable hiring and protect employees
A) Letters and diaries B) Official records C) Orders and manual D) Maps and overlays
A) Class IV B) Class I C) Class III D) Class II
A) They require extensive protection B) They are irreplaceable C) They are critical for business recovery D) They can cause inconvenience but are replaceable
A) Professional security integration B) Physical security implementation C) Personnel security investigation D) Personal safety instruction
A) Technical positions B) Management positions C) Entry-level positions D) Sensitive positions
A) Morals B) Discretion C) Technical skills D) Loyalty
A) To verify documents B) To check financial records C) To evaluate work performance D) To assess truthfulness during interviews
A) Physical fitness B) Technical competency C) National security suitability D) Management skills
A) 1,500 professional B) 2,000 professionals C) 3,000 professional D) 2,500 professional
A) 25 years old B) 21 years old C) 23 years old D) 33 years old E) 30 years old
A) The department of education B) The Philippine National Police C) The supervisory office for security and investigation Agency D) The national bureau of investigation
A) Government intelligence work B) Military operations C) Public law enforcement D) K9 security services
A) August 30,2022 B) July 30,2022 C) June 30,2021 D) July 30 ,2022
A) Must be of lager age B) Must be Filipino citizen C) Must be physically and mentally fit D) Must have a college degree
A) Exit interview B) Positive vetting C) Prowling D) Background investigation
A) Educational background B) Work experience C) Career progression D) Financial stability
A) Positive vetting B) Background investigation C) Prowling D) Undercover investigation
A) Barangay office B) Local court C) Municipal office D) PNP Directorate for intelligence
A) Only neuro -psychiatric B) Only physical fitness tests C) Both neuro-psychiatric and drug test plus physical and mental fitness D) Only drug test
A) The chief of the philippine National Police or authorities representative B) The Department of justice C) The secretary of interior D) The bureau of internal security
A) Restricted B) Private C) Secret D) Wtf E) Confidential |