A) Security Guard Regulation Act B) Private Security Services Industry Act C) Private Security Agencies Act D) Private Detective Act
A) License to Operate B) License to Officiate C) License to Observe D) License to Organize
A) License to Exercise Security Profession B) License to Employ Security Professionals C) License to Enlist Security Personnel D) License to Establish Security Profession
A) RA 5487 B) RA 10591 C) RA 9184 D) RA 7031
A) Chief of the Philippine National Police (PNP) or authorized representative B) Department of Interior and Local Government (DILG) C) Department of Labor and Employment (DOLE) D) Department of Justice
A) Only K9-unit handlers B) Any government police force C) Any person or juridical entity that recruits/security guards for hire D) Only persons providing alarm system monitoring
A) Must undergo pre-licensing training program B) Must own a security agency C) None — license is automatic D) Must be at least 30 years old
A) 4 years B) 5 years C) 2 years D) 3 years
A) 15% B) 20% C) 25% D) 10%
A) Yes, if wholly Filipino-owned and controlled B) Yes, but only foreign-owned ones C) No, juridical entities are excluded D) No, only individuals can apply
A) CCTV hardware suppliers and operations B) Private detective agencies C) Security training agencies D) Government police patrol units
A) False B) True
A) Charging administrative fee of 20% B) Hiring only Filipino citizens C) Using force to influence elections D) Operating without firearms
A) Pre-Licensing Training Programs B) D.Training only for K9 handlers C) On-the-job training only D) No training required
A) Persons issued a valid LESP after satisfying requirements B) Any person who works as a guard without license C) Only members of the Armed Forces of the Philippines D) Government investigators on
A) All of the above B) Private investigators and K9 handlers C) Security consultants and system designers D) Security guards and watchmen
A) A bond issued by an accredited surety or insurance company B) A security deposit with the client C) Proof of previous experience only D) Nothing — just a form
A) To strengthen regulation and establish quality standards for private security services B) D To nationalize all private security agencies C) To deregulate private security industry D) To limit the role of private security to non-critical establishments only
A) Yes — but only if foreign-owned B) Yes — there is no limit C) No — limit is 1,000 D) No — limit is 2,000
A) RA 6713 (Code of Conduct and Ethical Standards) B) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act) C) RA 7721 (1989 Polaris Law) D) RA 9165 (Comprehensive Dangerous Drugs Act)
A) None of the above B) Basic Security Guard Course C) Security Officers Training Course D) Both A and B
A) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA B) Only the PNP itself C) Any school — public or private — regardless of accreditation D) Foreign training institutions only
A) True B) False
A) Fine between ₱50,000 and ₱100,000 B) Must reapply in 1 year only C) Automatic cancellation without fine D) No penalty
A) Exempt from training requirements B) Equipped with firearms only C) Competent and able to complement law enforcement authorities in maintaining peace and order D) Allowed to perform law enforcement duties with full police powers
A) Refer the customer to HR B) Ignore the complaint C) Explain the policy politely and perform the inspection professionally D) Continue the inspection silently
A) Confront him aggressively B) Report to your supervisor and document the behavior C) Tell other guards verbally only D) Ignore it unless a crime happens
A) Panic and run B) Lock the doors C) Call the media D) Activate the alarm and assist evacuation
A) Let them enter since they look trustworthy B) Deny entry following access control procedure C) Ignore protocol for VIPs D) Argue with the visitor
A) Approach immediately without backup B) Turn off the CCTV C) Post the footage online D) Record the incident and notify the security manager
A) Check bags without permission B) Perform checks silently C) Avoid eye contac D) Greet customers and explain procedures briefly
A) Open it immediately B) Establish a perimeter and report it C) Move it to the office D) Kick it to check for noise
A) Tell them to search again B) Ignore the report C) Allow entry without identification D) Immediately deactivate the card and issue a temporary one
A) Accuse the suspect instantly B) Destroy old footage C) Avoid writing a report D) Gather evidence, review CCTV, and interview witnesses
A) Manage lines and communicate delays politely B) Allow skipping procedures C) Close the entrance D) Shout to maintain order
A) Manage lines and communicate delays politely B) Allow skipping procedures C) Shout to maintain order D) Close the entrance
A) Ignore the intelligence B) Cancel all work C) Lock the building permanently D) Strengthen perimeter checks and brief the team
A) Assist them courteously B) Point them in the wrong direction C) Walk away D) Tell them it’s not your job
A) Report and correct the violation professionally B) Ignore it C) Join them D) Record it for personal use
A) Allow entry immediately B) Verify documents and confirm with the office C) Ignore standard procedure D) Let them unload freely
A) Let witnesses hold the item B) Pass evidence to anyone available C) Leave evidence unsecured D) Document all handlers of evidence clearly
A) Report and record the malfunction immediately B) Remove the camera yourself C) Ignore the issue D) Cover it
A) Ask for autographs B) Let them pass unscreened C) Skip screening D) Provide guided access within protocol
A) Guide movements and maintain clear communication B) Use force immediately C) Block all exits D) Allow overcrowding
A) Spread the information immediately B) Analyze, verify, and confirm through reliable sources C) Ignore all intel D) Assume it’s false
A) Shout at them B) Maintain calm and de-escalate the situation C) Use force immediately D) Argue back
A) Move the victim without assessment B) Panic C) Crowd around the victim D) Call medical assistance and perform basic first aid
A) Give false details B) Politely decline and report the inquiry C) Provide the information D) Ignore it
A) Throw them in open bins B) Use secure storage and control access C) Leave documents on your desk D) Give copies to all employees
A) Hang up immediately B) Keep the caller talking, record details, and notify authorities C) Post the threat online D) Ignore it
A) Delay the report for days B) Submit reports without details C) Document facts clearly, chronologically, and objectively D) Add personal opinions
A) Interview checklist B) Organizational chart C) Risk impact matrix D) CCTV placement map
A) Posting emergency hotlines B) Installing lighting and surveillance C) Conducting background checks D) Issuing ID badges
A) Hiring only referrals B) Conducting random integrity testing C) Issuing visitor passes D) Providing annual training
A) Allowing unlimited photocopying B) Locking cabinets and applying access logs C) Filing documents alphabetically D) Placing all documents in open shelves
A) Allow all employees to bring any USB B) Encourage file transfers via social media C) Require encrypted USB devices and scanning D) Disable all USB ports permanently
A) Preparing the annual budget B) Drafting job descriptions C) Listing all possible internal and external threats D) Evaluating insurance policies
A) Risk probability-impact matrix B) Organizational mission-vision C) Security guard post order D) Duty roster
A) Enhancing office décor B) Allowing visitors to roam freely C) Open-door policy for transparency D) Implementing biometric access control
A) Offering valet parking B) Tree planting C) Directional signs only D) Adequate lighting and patrols
A) Posting "Do Not Enter" signs B) Removing all emergency exit doors C) Permanently locking all exits D) Installing exit alarms and panic bars
A) Allowing interns unrestricted access B) Using color coding for case folders C) Displaying documents on bulletin boards D) Keeping confidential files in fire-resistant safes
A) Closing all branches temporarily B) Updating organizational charts C) Conducting team building D) Relocating operations to an alternate site
A) Add more posters on policies B) Remove all physical barriers C) Install turnstiles with access control D) Provide umbrellas for visitors
A) Risk avoidance B) Monitoring guards' attendance C) Risk assessment and analysis D) Budget allocation
A) Using unverified public Wi-Fi B) Sending drafts to social media inboxes C) Applying encryption and multi-factor authentication D) Removing passwords
A) Evacuation and response drills B) General orientation lectures C) Salary increase program D) Flexible work hours
A) Reviewing financial reports B) Listening to employee complaints C) Performing penetration testing D) Rearranging inventory
A) Allow them full system access B) Issue limited access IDs and monitor activities C) Trust referrals without checks D) Give them master keys
A) Decorative labels B) “Confidential,” “Secret,” and “Restricted” stamps C) No markings to avoid suspicion D) Color-blind friendly icons
A) Any software they prefer B) Open public Wi-Fi C) Personal email accounts D) VPN and secure company devices
A) Eliminating CCTV monitoring B) Enhancing barriers, lighting, and patrols C) Increasing the number of blind spots D) Reducing guard deployment
A) Implementing daily data backups B) Removing antivirus software C) Cmm Giving more breaks D) Playing music during work
A) Ignoring irregularities found B) Reviewing guard logs and observing actual posts C) Looking only at CCTV footage D) Asking only senior guards for input
A) Establish access control points and metal detectors B) Allow guests to enter without screening C) Remove barriers to ensure smooth flow D) Rely solely on CCTV
A) Lay off all employees B) Lock all offices without notice C) Create a work-from-home and rotation plan D) Cancel all IT support
A) Natural Surveillance B) Access Control C) Territorial Reinforcement D) Maintenance
A) Decorative landscaping B) Multiple concealed corridors C) High interior walls D) Clearly marked exit routes
A) Mixed-use areas with pedestrian flow B) Commercial districts with regulated lighting C) High-crime clusters near abandoned structures D) Residential zones with active barangay patrols
A) Employee comfort spaces B) Blast stand-off distance C) Perimeter painting D) Interior signage
A) Decorative fences B) Carpeted hallways C) Motion-activated lighting D) Plain glass windows
A) Narrow alleys with poor lighting B) Walkways monitored by CCTV C) Pathways near visible public spaces D) Open parks with community presence
A) Window size B) Light distribution and shadow analysis C) Wall color D) Rooftop slope
A) Enhanced visitor experience B) High community engagement C) Poor access management D) Strong perimeter control
A) Public decorations B) Road network connectivity C) Sidewalk artistry D) Billboard placement
A) C Information security B) Natural surveillance C) Soft landscaping D) Access control
A) Outdoor recreation area B) Parking façade C) Reception lobby D) Core administrative area
A) Walls without monitoring create blind spots B) Walls encourage community bonding C) Walls improve natural lighting D) High barriers eliminate all threats
A) Breaks easily for ventilation B) Provides resistance to forced entry C) Fades sunlight exposure D) Reduces electricity consumption
A) High-visibility parks B) Areas with community events C) Areas with poor maintenance ("broken windows") D) Active commercial zones
A) CCTV makes lighting unnecessary B) CCTV automatically brightens footage C) CCTV becomes ineffective due to darkness D) CCTV compensates fully for lighting
A) Visibility for approaching threats B) Structural stability C) Employee comfort D) Interior temperature
A) Helps determine paint colors B) Identifies crowding that may mask hostile intent C) Improves interior aesthetics D) Reduces real estate value
A) Hidden entrances + poor lighting B) Glass doors + reinforced locks C) D CCTVs + guard patrols D) High walls + intrusion alarms
A) Hidden escape routes in informal settlements B) Overly wide roads C) Pedestrian-friendly walkways D) Well-planned zoning
A) Furniture placement B) Visitor screening points C) Employee morale D) Window design
A) Ability to blend with landscape B) Aesthetic quality C) Height, strength, and placement D) Color scheme
A) Employee punctuality B) Natural surveillance opportunities C) Landscaping efficiency D) Economic viability
A) Increased social interaction B) High environmental safety C) Elevated hazard and accident risk D) Improved traffic efficiency
A) Decorative appeal B) Noise reduction C) Visibility of approaching individuals D) Temperature control |