A) To create mechanical resistance B) To generate electrical signals C) To store digital combinations D) To prevent unauthorized entry and removal of items
A) It requires a digital code B) It’s permanently attached C) It uses electromagnetic force D) It’s portable and detachable with a sliding hasp
A) A type of key manufacturer B) A lock picker C) A lock installation tool D) A security system designed
A) Through electromagnetic pulses B) Using physical obstructions to block incorrect keys C) With digital combinations D) Through biometric scanning
A) They use mechanical tumblers B) They record usage time and user identity C) They operate solely on battery power D) They require physical keys
A) Through mechanical pins B) Using electromagnetic force and an armature plate C) With rotating discs D) Through digital keypads only
A) Using a sequence of numbers in proper order B) Through radio frequency identification C) Through mechanical key insertion D) By scanning fingerprints
A) A master key works only in emergency situations B) A grand master key only works on specific floors C) A master key opens all locks in the building D) A grand master key opens all in the building
A) To store original keys for all locks in the system B) To keep employee records C) To store maintenance supplies D) To hold only duplicate keys
A) Reports from the person responsible for key control in personnel B) Only lost key incidents C) Report from the security department D) Only master key assignments
A) They serve exactly the same purpose B) A vault is portable while a safe is fixed C) A safe is larger than a vault D) A vault is part of the building structure and more heavily constructed
A) Recording lock code numbers and key assignments B) Only tracking master key C) Weekly audits only D) Annual inventory checks
A) Only when key are lost B) Only during annual reviews C) Unannounced and by management D) On a fixed monthly schedule
A) Daily counts of master keys B) Weekly safe inspections C) Periodic accounting of all keys issued to employees D) Annual checks only
A) Because it involves people both as assets and potential threats B) Because it involves financial resources C) Because it involves technological assets D) Because it involves physical infrastructure
A) Serving as a screening device in hiring B) Developing security awareness among employees C) Providing background investigation services D) Managing building access control systems
A) Creation B) Transfer C) Classification D) Storage and Retrieval
A) Secret B) Confidential C) Top secret D) Restricted
A) Class II-Important Documents B) Class III-Useful Documents C) Class I-Vital Documents D) Class IV-Non-essential Documents
A) Information is expansive B) Information is costly C) Information requires barriers D) Information is voluminous
A) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty B) A system of trafficking employee attendance C) A process of monitoring employee computer usage D) A method of evaluating employee performance
A) Social media passwords B) Foreign travel history C) Employment history D) Criminal record
A) To monitor employee internet usage B) To verify employment references C) To conduct random drug testing D) To inspect with careful thoroughness through personal interviews under stress
A) Positive vetting B) Exit interview C) Financial inquiry D) Undercover investigation
A) Training makes security personnel conscious B) Security systems are more important than personnel training C) Personnel are the weakest link in the security chain D) Training is necessary for the practice of NEED TO KNOW principle
A) Top secret B) Secret C) Restricted D) Private
A) Green B) Blue C) White D) Red
A) Information requires barriers B) Information is costly C) Information has a limited life D) Information is expansive
A) Development among employees B) Financial awareness C) Technical awareness D) Employee development
A) Immediate termination B) Protection against unfounded claims C) Legal prosecution D) Public disclosure
A) By serving as a screening device B) By managing payroll C) By conducting performance reviews D) By focusing on technical skills only
A) Automation of process B) Cost effectiveness C) Speed of hiring D) Need for establishment
A) During orientation and training B) During refresher conferences C) During security promotions D) During the exit interview
A) NBI clearance B) ISAFP clearance C) PNP Directorate for intelligence D) Barangay clearance
A) To give departing employees an opportunity to list grievances B) To collect company property C) To conduct final performance evaluation D) To issue final paycheck
A) Monitoring of employee communications B) Physical surveillance of employees C) Predicting subject’s reactions in future critical situations through behavior observation D) Random security checks of employee workstations
A) To reduce storage costs B) To increase office efficiency C) To deter and impede potential spies D) To simplify document sharing
A) Customer database only B) Business methods only C) Manufacturing processes only D) Original literary and musical work
A) Information security B) Physical security C) Technological security D) Personnel security
A) It requires the most financial investment B) It requires less oversight C) It involves protecting both assets and managing human threats D) It is easier to implement than other security measures
A) Doctrina-teaching method B) Docere-to show C) Documentum-teaching or lesson D) Documenta-written proof
A) Green B) Blue C) Red D) White
A) Documents that are replaceable with some effort B) Documents that cause minor inconvenience if lost C) Documents that are irreplaceable and critical for recovery D) Documents that are routine in nature
A) Restricted B) Private C) Confidential D) Top secret E) Secret
A) Only external threats B) Time management issues C) Attendance problems D) Theft and sabotage
A) Technological approach B) Reactive approach only C) Financial approach D) Comprehensive approach to protection and screening
A) External theft B) Technology failures C) Employee negligence or participation in theft D) Natural disasters
A) Monitoring computer systems B) Hiring suitable employees C) Providing security to employees D) Supporting employee functions
A) 5 B) 3 C) 6 D) 2 E) 4
A) Security education B) Physical barriers C) Financial auditing D) Emergency response
A) Secret B) Confidential C) Restricted D) Top secret
A) Class IV-Non-essential documents B) Class I-Vital documents C) Class II-important documents D) Class III-useful documents
A) 5 B) 6 C) 4 D) 8 E) 7
A) NBI clearance B) Barangay clearance C) Court clearance D) Municipal clearance
A) To predict future reactions B) To verify past employment C) To conduct surveillance D) To check criminal records
A) Background investigation of potential and current employees B) Competitor analysis C) Criminal investigation only D) Market research investigation only
A) Offers financial protection B) Protects against unfounded allegations and discrimination C) Provide physical protection only D) Manages employee benefits
A) Security awareness B) Management training C) Career development D) Technical skills
A) A government-issued patent B) A copyright protection C) Words or symbols used to differentiate goods D) A secret formula
A) Patents B) Trade secret C) Copyrights D) Trademark
A) Misappropriation B) Piracy C) Counterfeiting D) Infringement
A) Confidential B) Restricted C) Top secret D) Secret
A) Positive vetting B) Undercover investigation C) Background investigation D) Financial and lifestyle inquiry
A) Direct questioning B) Concealed identity C) Public monitoring D) Open surveillance
A) ISAFP clearance B) Court clearance C) NBI clearance D) Local clearance
A) To discover unknown problems B) To process final payments C) To terminate employment D) To issue clearances
A) Investigates employees suspected of wrongdoing B) Investigates only external threats C) Investigates market conditions D) Investigates competitor activities
A) Medical screening B) Customer screening C) Drug testing only D) Employee hiring screening
A) To handle public relations B) To maximize profits C) To ensure suitable hiring and protect employees D) To manage inventory
A) Orders and manual B) Maps and overlays C) Official records D) Letters and diaries
A) Class III B) Class IV C) Class II D) Class I
A) They can cause inconvenience but are replaceable B) They are irreplaceable C) They are critical for business recovery D) They require extensive protection
A) Personnel security investigation B) Physical security implementation C) Personal safety instruction D) Professional security integration
A) Technical positions B) Entry-level positions C) Sensitive positions D) Management positions
A) Discretion B) Technical skills C) Loyalty D) Morals
A) To evaluate work performance B) To check financial records C) To assess truthfulness during interviews D) To verify documents
A) Management skills B) Technical competency C) Physical fitness D) National security suitability
A) 3,000 professional B) 2,500 professional C) 2,000 professionals D) 1,500 professional
A) 23 years old B) 21 years old C) 30 years old D) 25 years old E) 33 years old
A) The supervisory office for security and investigation Agency B) The department of education C) The Philippine National Police D) The national bureau of investigation
A) Public law enforcement B) Military operations C) K9 security services D) Government intelligence work
A) August 30,2022 B) July 30 ,2022 C) July 30,2022 D) June 30,2021
A) Must be Filipino citizen B) Must be physically and mentally fit C) Must be of lager age D) Must have a college degree
A) Exit interview B) Background investigation C) Positive vetting D) Prowling
A) Educational background B) Financial stability C) Career progression D) Work experience
A) Undercover investigation B) Prowling C) Positive vetting D) Background investigation
A) Municipal office B) PNP Directorate for intelligence C) Barangay office D) Local court
A) Only physical fitness tests B) Both neuro-psychiatric and drug test plus physical and mental fitness C) Only drug test D) Only neuro -psychiatric
A) The bureau of internal security B) The secretary of interior C) The chief of the philippine National Police or authorities representative D) The Department of justice
A) Restricted B) Private C) Confidential D) Secret E) Wtf |