helurr ismana
  • 1. What is the primary function of a lock?
A) To generate electrical signals
B) To create mechanical resistance
C) To store digital combinations
D) To prevent unauthorized entry and removal of items
  • 2. What distinguishes a padlock from other lock types?
A) It requires a digital code
B) It uses electromagnetic force
C) It’s permanently attached
D) It’s portable and detachable with a sliding hasp
  • 3. What is “Peterman”in English terminology?
A) A security system designed
B) A lock picker
C) A lock installation tool
D) A type of key manufacturer
  • 4. How does a warded lock function?
A) Using physical obstructions to block incorrect keys
B) With digital combinations
C) Through biometric scanning
D) Through electromagnetic pulses
  • 5. What is unique about card-operated locks?
A) They use mechanical tumblers
B) They require physical keys
C) They record usage time and user identity
D) They operate solely on battery power
  • 6. How do electromagnetic locks secure an entry point?
A) Through mechanical pins
B) With rotating discs
C) Through digital keypads only
D) Using electromagnetic force and an armature plate
  • 7. How does a code-operated lock function?
A) Through radio frequency identification
B) By scanning fingerprints
C) Using a sequence of numbers in proper order
D) Through mechanical key insertion
  • 8. What is the primary difference between a grand master key and a master key?
A) A master key opens all locks in the building
B) A grand master key only works on specific floors
C) A grand master key opens all in the building
D) A master key works only in emergency situations
  • 9. What is the purpose of a key cabinet in a key control system?
A) To hold only duplicate keys
B) To keep employee records
C) To store maintenance supplies
D) To store original keys for all locks in the system
  • 10. What should be included in daily reports for key control?
A) Only master key assignments
B) Only lost key incidents
C) Reports from the person responsible for key control in personnel
D) Report from the security department
  • 11. What is the main distinction between a safe and a vault?
A) A vault is portable while a safe is fixed
B) They serve exactly the same purpose
C) A vault is part of the building structure and more heavily constructed
D) A safe is larger than a vault
  • 12. What is required for proper key record management?
A) Only tracking master key
B) Weekly audits only
C) Recording lock code numbers and key assignments
D) Annual inventory checks
  • 13. How often should key control Audits be conducted?
A) Only when key are lost
B) On a fixed monthly schedule
C) Unannounced and by management
D) Only during annual reviews
  • 14. What is required for proper key inventory management?
A) Daily counts of master keys
B) Periodic accounting of all keys issued to employees
C) Annual checks only
D) Weekly safe inspections
  • 15. What is the primary reason personnel security is considered the most important among the three main categories of security?
A) Because it involves financial resources
B) Because it involves people both as assets and potential threats
C) Because it involves technological assets
D) Because it involves physical infrastructure
  • 16. Which of the following is not a key function of personnel security?
A) Managing building access control systems
B) Developing security awareness among employees
C) Serving as a screening device in hiring
D) Providing background investigation services
  • 17. According to the document cycle,what is the first stage in information handling?
A) Creation
B) Storage and Retrieval
C) Classification
D) Transfer
  • 18. Which security classification would be applied to information that could cause “exceptionally grave damage “to the nation if disclosed?
A) Secret
B) Confidential
C) Top secret
D) Restricted
  • 19. Which type of documents are considered irreplaceable and needed to recover cash or replace equipment?
A) Class III-Useful Documents
B) Class I-Vital Documents
C) Class IV-Non-essential Documents
D) Class II-Important Documents
  • 20. What characteristic of information indicates that it can easily expand to cover a scope?
A) Information requires barriers
B) Information is expansive
C) Information is costly
D) Information is voluminous
  • 21. Personnel security investigation(PSI)is defined as ____________?
A) A method of evaluating employee performance
B) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty
C) A process of monitoring employee computer usage
D) A system of trafficking employee attendance
  • 22. During a background investigation (BI),which component is Not typically included?
A) Social media passwords
B) Foreign travel history
C) Employment history
D) Criminal record
  • 23. What is the primary purpose of positive vetting?
A) To inspect with careful thoroughness through personal interviews under stress
B) To monitor employee internet usage
C) To verify employment references
D) To conduct random drug testing
  • 24. Which type of investigation involves placing an agent whose true identity remains unknown?
A) Exit interview
B) Financial inquiry
C) Undercover investigation
D) Positive vetting
  • 25. Which of the following is NOT one of the three security concepts?
A) Personnel are the weakest link in the security chain
B) Training makes security personnel conscious
C) Security systems are more important than personnel training
D) Training is necessary for the practice of NEED TO KNOW principle
  • 26. Under the classification of sensitive information which category would “marketing strategies “fail into?
A) Private
B) Top secret
C) Restricted
D) Secret
  • 27. What color code is associated with “Confidential “classification?
A) Green
B) Red
C) Blue
D) White
  • 28. Which characteristic of information suggests that it’s value can decrease over time?
A) Information requires barriers
B) Information has a limited life
C) Information is costly
D) Information is expansive
  • 29. What aspect of security awareness is emphasized?
A) Technical awareness
B) Employee development
C) Financial awareness
D) Development among employees
  • 30. What is key responsibility regarding allegations against employees ?
A) Public disclosure
B) Protection against unfounded claims
C) Immediate termination
D) Legal prosecution
  • 31. How does personnel security contribute to employee hiring?
A) By serving as a screening device
B) By focusing on technical skills only
C) By conducting performance reviews
D) By managing payroll
  • 32. What is emphasized regarding the system of hiring?
A) Need for establishment
B) Speed of hiring
C) Automation of process
D) Cost effectiveness
  • 33. During the security education program,when are employees typically asked to sign acknowledgment of company policies?
A) During security promotions
B) During the exit interview
C) During refresher conferences
D) During orientation and training
  • 34. Which of the following is NOT a type of national agency check (NAC)?
A) ISAFP clearance
B) NBI clearance
C) Barangay clearance
D) PNP Directorate for intelligence
  • 35. What is the purpose of an exit interview in personnel security?
A) To give departing employees an opportunity to list grievances
B) To conduct final performance evaluation
C) To collect company property
D) To issue final paycheck
  • 36. What is prowling in the personnel security?
A) Predicting subject’s reactions in future critical situations through behavior observation
B) Physical surveillance of employees
C) Random security checks of employee workstations
D) Monitoring of employee communications
  • 37. What is one of the main purposes of protecting classified materials?
A) To increase office efficiency
B) To deter and impede potential spies
C) To reduce storage costs
D) To simplify document sharing
  • 38. What can be protected under copyright law?
A) Manufacturing processes only
B) Business methods only
C) Original literary and musical work
D) Customer database only
  • 39. What is considered the most important among the three main categories of security?
A) Technological security
B) Information security
C) Personnel security
D) Physical security
  • 40. Why is personnel security considered most crucial?
A) It requires the most financial investment
B) It requires less oversight
C) It is easier to implement than other security measures
D) It involves protecting both assets and managing human threats
  • 41. What is the Latin origin of the word “Document “ and what does it denote?
A) Documenta-written proof
B) Doctrina-teaching method
C) Docere-to show
D) Documentum-teaching or lesson
  • 42. Which color code is associated with “Top secret “classified matter?
A) Blue
B) White
C) Green
D) Red
  • 43. What type of documents are considered Class Vital Documents?
A) Documents that cause minor inconvenience if lost
B) Documents that are irreplaceable and critical for recovery
C) Documents that are routine in nature
D) Documents that are replaceable with some effort
  • 44. Which classification of sensitive information relates specifically to employees?
A) Confidential
B) Restricted
C) Secret
D) Top secret
E) Private
  • 45. What type of activities are mentioned regarding employee misconduct?
A) Attendance problems
B) Only external threats
C) Time management issues
D) Theft and sabotage
  • 46. What approach to security is highlighted regarding employees?
A) Comprehensive approach to protection and screening
B) Financial approach
C) Technological approach
D) Reactive approach only
  • 47. What is a major source of losses?
A) Technology failures
B) External theft
C) Natural disasters
D) Employee negligence or participation in theft
  • 48. What is NOT mentioned as a purpose of personnel security?
A) Supporting employee functions
B) Hiring suitable employees
C) Providing security to employees
D) Monitoring computer systems
  • 49. How many key functions of personnel security are listed?
A) 2
B) 5
C) 3
D) 6
E) 4
  • 50. Which aspect is included in the scope of personnel security?
A) Financial auditing
B) Physical barriers
C) Emergency response
D) Security education
  • 51. Which type of classified matter would cause “exceptionally grave damage “to the nation if disclosed?
A) Restricted
B) Secret
C) Confidential
D) Top secret
  • 52. Which category of documents represents the bulk of records that need be protected in case of disaster?
A) Class I-Vital documents
B) Class III-useful documents
C) Class IV-Non-essential documents
D) Class II-important documents
  • 53. How many factors are primarily considered in conducting a background investigation?
A) 8
B) 6
C) 4
D) 7
E) 5
  • 54. Which is NOT a type of local agency check (LAC)?
A) Barangay clearance
B) Court clearance
C) NBI clearance
D) Municipal clearance
  • 55. What is the purpose of prowling in personnel security?
A) To check criminal records
B) To predict future reactions
C) To verify past employment
D) To conduct surveillance
  • 56. What type of investigation service does personnel security provide?
A) Background investigation of potential and current employees
B) Criminal investigation only
C) Market research investigation only
D) Competitor analysis
  • 57. What role does personnel security play in employee protection?
A) Offers financial protection
B) Protects against unfounded allegations and discrimination
C) Provide physical protection only
D) Manages employee benefits
  • 58. What developmental aspect does personnel security handle?
A) Career development
B) Technical skills
C) Security awareness
D) Management training
  • 59. What is a trademark?
A) Words or symbols used to differentiate goods
B) A government-issued patent
C) A copyright protection
D) A secret formula
  • 60. Which intellectual property protection is given to creators of original literary works?
A) Trade secret
B) Copyrights
C) Trademark
D) Patents
  • 61. What constitutes a trade secret violation in legal terms?
A) Misappropriation
B) Counterfeiting
C) Infringement
D) Piracy
  • 62. Which classified matter category uses red as its color code ?
A) Confidential
B) Secret
C) Restricted
D) Top secret
  • 63. Which investigation type focuses on income and mode of living?
A) Background investigation
B) Positive vetting
C) Undercover investigation
D) Financial and lifestyle inquiry
  • 64. What is a key characteristic of undercover investigation?
A) Public monitoring
B) Open surveillance
C) Concealed identity
D) Direct questioning
  • 65. Which National Agency Check (NAC)is related to military intelligence?
A) ISAFP clearance
B) Local clearance
C) Court clearance
D) NBI clearance
  • 66. What is the primary benefit of conducting exit interviews?
A) To process final payments
B) To discover unknown problems
C) To issue clearances
D) To terminate employment
  • 67. What investigative functions does personnel security serve?
A) Investigates employees suspected of wrongdoing
B) Investigates competitor activities
C) Investigates market conditions
D) Investigates only external threats
  • 68. What screening function does personnel security provide?
A) Medical screening
B) Employee hiring screening
C) Customer screening
D) Drug testing only
  • 69. What is one of the dual purposes of personnel security?
A) To handle public relations
B) To maximize profits
C) To manage inventory
D) To ensure suitable hiring and protect employees
  • 70. What type of documents are personal documents?
A) Letters and diaries
B) Official records
C) Orders and manual
D) Maps and overlays
  • 71. Which document class includes records whose reproduction requires considerable expense and labor?
A) Class IV
B) Class I
C) Class III
D) Class II
  • 72. What is the primary characteristic of class III -useful documents?
A) They require extensive protection
B) They are irreplaceable
C) They are critical for business recovery
D) They can cause inconvenience but are replaceable
  • 73. What element is part of PSI mentioned in the scope?
A) Professional security integration
B) Physical security implementation
C) Personnel security investigation
D) Personal safety instruction
  • 74. What type of position is specifically mentioned regarding background investigation?
A) Technical positions
B) Management positions
C) Entry-level positions
D) Sensitive positions
  • 75. Which factor is NOT considered in background investigation?
A) Morals
B) Discretion
C) Technical skills
D) Loyalty
  • 76. What is the purpose of deception detection techniques?
A) To verify documents
B) To check financial records
C) To evaluate work performance
D) To assess truthfulness during interviews
  • 77. What is positive vetting primarily used to assess?
A) Physical fitness
B) Technical competency
C) National security suitability
D) Management skills
  • 78. According to RA 11917,what is the maximum number of private security professionals that a private security Agency (PSA)can employ?
A) 1,500 professional
B) 2,000 professionals
C) 3,000 professional
D) 2,500 professional
  • 79. What is the minimum age requirement for a PSA operator or license?
A) 25 years old
B) 21 years old
C) 23 years old
D) 33 years old
E) 30 years old
  • 80. Who is responsible for issuing the letter of authority to conduct training for LESP? a the Philippine National Police?
A) The department of education
B) The Philippine National Police
C) The supervisory office for security and investigation Agency
D) The national bureau of investigation
  • 81. Which of the following services falls under the private security industry?
A) Government intelligence work
B) Military operations
C) Public law enforcement
D) K9 security services
  • 82. When did RA 11917 take effect?
A) August 30,2022
B) July 30,2022
C) June 30,2021
D) July 30 ,2022
  • 83. Which of the following is NOT a basic qualification requirement for obtaining an LESP?
A) Must be of lager age
B) Must be Filipino citizen
C) Must be physically and mentally fit
D) Must have a college degree
  • 84. Which investigation method use’s questionnaire like honesty test?
A) Exit interview
B) Positive vetting
C) Prowling
D) Background investigation
  • 85. What aspect does the earning -to debt ratio analyze?
A) Educational background
B) Work experience
C) Career progression
D) Financial stability
  • 86. What type of investigation involves placing an agent in an unknown role?
A) Positive vetting
B) Background investigation
C) Prowling
D) Undercover investigation
  • 87. Which agency is part of the national agency check (NAC)?
A) Barangay office
B) Local court
C) Municipal office
D) PNP Directorate for intelligence
  • 88. What health-related requirements must a PSA operator meet?
A) Only neuro -psychiatric
B) Only physical fitness tests
C) Both neuro-psychiatric and drug test plus physical and mental fitness
D) Only drug test
  • 89. Who has the authority to issue a license to operate (LTO)?
A) The chief of the philippine National Police or authorities representative
B) The Department of justice
C) The secretary of interior
D) The bureau of internal security
  • 90. Which sensitive information classification has strictly limited use and access?
A) Restricted
B) Private
C) Secret
D) Wtf
E) Confidential
Created with That Quiz — where a math practice test is always one click away.