helurr ismana
  • 1. What is the primary function of a lock?
A) To create mechanical resistance
B) To generate electrical signals
C) To store digital combinations
D) To prevent unauthorized entry and removal of items
  • 2. What distinguishes a padlock from other lock types?
A) It requires a digital code
B) It’s permanently attached
C) It uses electromagnetic force
D) It’s portable and detachable with a sliding hasp
  • 3. What is “Peterman”in English terminology?
A) A type of key manufacturer
B) A lock picker
C) A lock installation tool
D) A security system designed
  • 4. How does a warded lock function?
A) Through electromagnetic pulses
B) Using physical obstructions to block incorrect keys
C) With digital combinations
D) Through biometric scanning
  • 5. What is unique about card-operated locks?
A) They use mechanical tumblers
B) They record usage time and user identity
C) They operate solely on battery power
D) They require physical keys
  • 6. How do electromagnetic locks secure an entry point?
A) Through mechanical pins
B) Using electromagnetic force and an armature plate
C) With rotating discs
D) Through digital keypads only
  • 7. How does a code-operated lock function?
A) Using a sequence of numbers in proper order
B) Through radio frequency identification
C) Through mechanical key insertion
D) By scanning fingerprints
  • 8. What is the primary difference between a grand master key and a master key?
A) A master key works only in emergency situations
B) A grand master key only works on specific floors
C) A master key opens all locks in the building
D) A grand master key opens all in the building
  • 9. What is the purpose of a key cabinet in a key control system?
A) To store original keys for all locks in the system
B) To keep employee records
C) To store maintenance supplies
D) To hold only duplicate keys
  • 10. What should be included in daily reports for key control?
A) Reports from the person responsible for key control in personnel
B) Only lost key incidents
C) Report from the security department
D) Only master key assignments
  • 11. What is the main distinction between a safe and a vault?
A) They serve exactly the same purpose
B) A vault is portable while a safe is fixed
C) A safe is larger than a vault
D) A vault is part of the building structure and more heavily constructed
  • 12. What is required for proper key record management?
A) Recording lock code numbers and key assignments
B) Only tracking master key
C) Weekly audits only
D) Annual inventory checks
  • 13. How often should key control Audits be conducted?
A) Only when key are lost
B) Only during annual reviews
C) Unannounced and by management
D) On a fixed monthly schedule
  • 14. What is required for proper key inventory management?
A) Daily counts of master keys
B) Weekly safe inspections
C) Periodic accounting of all keys issued to employees
D) Annual checks only
  • 15. What is the primary reason personnel security is considered the most important among the three main categories of security?
A) Because it involves people both as assets and potential threats
B) Because it involves financial resources
C) Because it involves technological assets
D) Because it involves physical infrastructure
  • 16. Which of the following is not a key function of personnel security?
A) Serving as a screening device in hiring
B) Developing security awareness among employees
C) Providing background investigation services
D) Managing building access control systems
  • 17. According to the document cycle,what is the first stage in information handling?
A) Creation
B) Transfer
C) Classification
D) Storage and Retrieval
  • 18. Which security classification would be applied to information that could cause “exceptionally grave damage “to the nation if disclosed?
A) Secret
B) Confidential
C) Top secret
D) Restricted
  • 19. Which type of documents are considered irreplaceable and needed to recover cash or replace equipment?
A) Class II-Important Documents
B) Class III-Useful Documents
C) Class I-Vital Documents
D) Class IV-Non-essential Documents
  • 20. What characteristic of information indicates that it can easily expand to cover a scope?
A) Information is expansive
B) Information is costly
C) Information requires barriers
D) Information is voluminous
  • 21. Personnel security investigation(PSI)is defined as ____________?
A) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty
B) A system of trafficking employee attendance
C) A process of monitoring employee computer usage
D) A method of evaluating employee performance
  • 22. During a background investigation (BI),which component is Not typically included?
A) Social media passwords
B) Foreign travel history
C) Employment history
D) Criminal record
  • 23. What is the primary purpose of positive vetting?
A) To monitor employee internet usage
B) To verify employment references
C) To conduct random drug testing
D) To inspect with careful thoroughness through personal interviews under stress
  • 24. Which type of investigation involves placing an agent whose true identity remains unknown?
A) Positive vetting
B) Exit interview
C) Financial inquiry
D) Undercover investigation
  • 25. Which of the following is NOT one of the three security concepts?
A) Training makes security personnel conscious
B) Security systems are more important than personnel training
C) Personnel are the weakest link in the security chain
D) Training is necessary for the practice of NEED TO KNOW principle
  • 26. Under the classification of sensitive information which category would “marketing strategies “fail into?
A) Top secret
B) Secret
C) Restricted
D) Private
  • 27. What color code is associated with “Confidential “classification?
A) Green
B) Blue
C) White
D) Red
  • 28. Which characteristic of information suggests that it’s value can decrease over time?
A) Information requires barriers
B) Information is costly
C) Information has a limited life
D) Information is expansive
  • 29. What aspect of security awareness is emphasized?
A) Development among employees
B) Financial awareness
C) Technical awareness
D) Employee development
  • 30. What is key responsibility regarding allegations against employees ?
A) Immediate termination
B) Protection against unfounded claims
C) Legal prosecution
D) Public disclosure
  • 31. How does personnel security contribute to employee hiring?
A) By serving as a screening device
B) By managing payroll
C) By conducting performance reviews
D) By focusing on technical skills only
  • 32. What is emphasized regarding the system of hiring?
A) Automation of process
B) Cost effectiveness
C) Speed of hiring
D) Need for establishment
  • 33. During the security education program,when are employees typically asked to sign acknowledgment of company policies?
A) During orientation and training
B) During refresher conferences
C) During security promotions
D) During the exit interview
  • 34. Which of the following is NOT a type of national agency check (NAC)?
A) NBI clearance
B) ISAFP clearance
C) PNP Directorate for intelligence
D) Barangay clearance
  • 35. What is the purpose of an exit interview in personnel security?
A) To give departing employees an opportunity to list grievances
B) To collect company property
C) To conduct final performance evaluation
D) To issue final paycheck
  • 36. What is prowling in the personnel security?
A) Monitoring of employee communications
B) Physical surveillance of employees
C) Predicting subject’s reactions in future critical situations through behavior observation
D) Random security checks of employee workstations
  • 37. What is one of the main purposes of protecting classified materials?
A) To reduce storage costs
B) To increase office efficiency
C) To deter and impede potential spies
D) To simplify document sharing
  • 38. What can be protected under copyright law?
A) Customer database only
B) Business methods only
C) Manufacturing processes only
D) Original literary and musical work
  • 39. What is considered the most important among the three main categories of security?
A) Information security
B) Physical security
C) Technological security
D) Personnel security
  • 40. Why is personnel security considered most crucial?
A) It requires the most financial investment
B) It requires less oversight
C) It involves protecting both assets and managing human threats
D) It is easier to implement than other security measures
  • 41. What is the Latin origin of the word “Document “ and what does it denote?
A) Doctrina-teaching method
B) Docere-to show
C) Documentum-teaching or lesson
D) Documenta-written proof
  • 42. Which color code is associated with “Top secret “classified matter?
A) Green
B) Blue
C) Red
D) White
  • 43. What type of documents are considered Class Vital Documents?
A) Documents that are replaceable with some effort
B) Documents that cause minor inconvenience if lost
C) Documents that are irreplaceable and critical for recovery
D) Documents that are routine in nature
  • 44. Which classification of sensitive information relates specifically to employees?
A) Restricted
B) Private
C) Confidential
D) Top secret
E) Secret
  • 45. What type of activities are mentioned regarding employee misconduct?
A) Only external threats
B) Time management issues
C) Attendance problems
D) Theft and sabotage
  • 46. What approach to security is highlighted regarding employees?
A) Technological approach
B) Reactive approach only
C) Financial approach
D) Comprehensive approach to protection and screening
  • 47. What is a major source of losses?
A) External theft
B) Technology failures
C) Employee negligence or participation in theft
D) Natural disasters
  • 48. What is NOT mentioned as a purpose of personnel security?
A) Monitoring computer systems
B) Hiring suitable employees
C) Providing security to employees
D) Supporting employee functions
  • 49. How many key functions of personnel security are listed?
A) 5
B) 3
C) 6
D) 2
E) 4
  • 50. Which aspect is included in the scope of personnel security?
A) Security education
B) Physical barriers
C) Financial auditing
D) Emergency response
  • 51. Which type of classified matter would cause “exceptionally grave damage “to the nation if disclosed?
A) Secret
B) Confidential
C) Restricted
D) Top secret
  • 52. Which category of documents represents the bulk of records that need be protected in case of disaster?
A) Class IV-Non-essential documents
B) Class I-Vital documents
C) Class II-important documents
D) Class III-useful documents
  • 53. How many factors are primarily considered in conducting a background investigation?
A) 5
B) 6
C) 4
D) 8
E) 7
  • 54. Which is NOT a type of local agency check (LAC)?
A) NBI clearance
B) Barangay clearance
C) Court clearance
D) Municipal clearance
  • 55. What is the purpose of prowling in personnel security?
A) To predict future reactions
B) To verify past employment
C) To conduct surveillance
D) To check criminal records
  • 56. What type of investigation service does personnel security provide?
A) Background investigation of potential and current employees
B) Competitor analysis
C) Criminal investigation only
D) Market research investigation only
  • 57. What role does personnel security play in employee protection?
A) Offers financial protection
B) Protects against unfounded allegations and discrimination
C) Provide physical protection only
D) Manages employee benefits
  • 58. What developmental aspect does personnel security handle?
A) Security awareness
B) Management training
C) Career development
D) Technical skills
  • 59. What is a trademark?
A) A government-issued patent
B) A copyright protection
C) Words or symbols used to differentiate goods
D) A secret formula
  • 60. Which intellectual property protection is given to creators of original literary works?
A) Patents
B) Trade secret
C) Copyrights
D) Trademark
  • 61. What constitutes a trade secret violation in legal terms?
A) Misappropriation
B) Piracy
C) Counterfeiting
D) Infringement
  • 62. Which classified matter category uses red as its color code ?
A) Confidential
B) Restricted
C) Top secret
D) Secret
  • 63. Which investigation type focuses on income and mode of living?
A) Positive vetting
B) Undercover investigation
C) Background investigation
D) Financial and lifestyle inquiry
  • 64. What is a key characteristic of undercover investigation?
A) Direct questioning
B) Concealed identity
C) Public monitoring
D) Open surveillance
  • 65. Which National Agency Check (NAC)is related to military intelligence?
A) ISAFP clearance
B) Court clearance
C) NBI clearance
D) Local clearance
  • 66. What is the primary benefit of conducting exit interviews?
A) To discover unknown problems
B) To process final payments
C) To terminate employment
D) To issue clearances
  • 67. What investigative functions does personnel security serve?
A) Investigates employees suspected of wrongdoing
B) Investigates only external threats
C) Investigates market conditions
D) Investigates competitor activities
  • 68. What screening function does personnel security provide?
A) Medical screening
B) Customer screening
C) Drug testing only
D) Employee hiring screening
  • 69. What is one of the dual purposes of personnel security?
A) To handle public relations
B) To maximize profits
C) To ensure suitable hiring and protect employees
D) To manage inventory
  • 70. What type of documents are personal documents?
A) Orders and manual
B) Maps and overlays
C) Official records
D) Letters and diaries
  • 71. Which document class includes records whose reproduction requires considerable expense and labor?
A) Class III
B) Class IV
C) Class II
D) Class I
  • 72. What is the primary characteristic of class III -useful documents?
A) They can cause inconvenience but are replaceable
B) They are irreplaceable
C) They are critical for business recovery
D) They require extensive protection
  • 73. What element is part of PSI mentioned in the scope?
A) Personnel security investigation
B) Physical security implementation
C) Personal safety instruction
D) Professional security integration
  • 74. What type of position is specifically mentioned regarding background investigation?
A) Technical positions
B) Entry-level positions
C) Sensitive positions
D) Management positions
  • 75. Which factor is NOT considered in background investigation?
A) Discretion
B) Technical skills
C) Loyalty
D) Morals
  • 76. What is the purpose of deception detection techniques?
A) To evaluate work performance
B) To check financial records
C) To assess truthfulness during interviews
D) To verify documents
  • 77. What is positive vetting primarily used to assess?
A) Management skills
B) Technical competency
C) Physical fitness
D) National security suitability
  • 78. According to RA 11917,what is the maximum number of private security professionals that a private security Agency (PSA)can employ?
A) 3,000 professional
B) 2,500 professional
C) 2,000 professionals
D) 1,500 professional
  • 79. What is the minimum age requirement for a PSA operator or license?
A) 23 years old
B) 21 years old
C) 30 years old
D) 25 years old
E) 33 years old
  • 80. Who is responsible for issuing the letter of authority to conduct training for LESP? a the Philippine National Police?
A) The supervisory office for security and investigation Agency
B) The department of education
C) The Philippine National Police
D) The national bureau of investigation
  • 81. Which of the following services falls under the private security industry?
A) Public law enforcement
B) Military operations
C) K9 security services
D) Government intelligence work
  • 82. When did RA 11917 take effect?
A) August 30,2022
B) July 30 ,2022
C) July 30,2022
D) June 30,2021
  • 83. Which of the following is NOT a basic qualification requirement for obtaining an LESP?
A) Must be Filipino citizen
B) Must be physically and mentally fit
C) Must be of lager age
D) Must have a college degree
  • 84. Which investigation method use’s questionnaire like honesty test?
A) Exit interview
B) Background investigation
C) Positive vetting
D) Prowling
  • 85. What aspect does the earning -to debt ratio analyze?
A) Educational background
B) Financial stability
C) Career progression
D) Work experience
  • 86. What type of investigation involves placing an agent in an unknown role?
A) Undercover investigation
B) Prowling
C) Positive vetting
D) Background investigation
  • 87. Which agency is part of the national agency check (NAC)?
A) Municipal office
B) PNP Directorate for intelligence
C) Barangay office
D) Local court
  • 88. What health-related requirements must a PSA operator meet?
A) Only physical fitness tests
B) Both neuro-psychiatric and drug test plus physical and mental fitness
C) Only drug test
D) Only neuro -psychiatric
  • 89. Who has the authority to issue a license to operate (LTO)?
A) The bureau of internal security
B) The secretary of interior
C) The chief of the philippine National Police or authorities representative
D) The Department of justice
  • 90. Which sensitive information classification has strictly limited use and access?
A) Restricted
B) Private
C) Confidential
D) Secret
E) Wtf
Created with That Quiz — where a math practice test is always one click away.