A) Security Guard Regulation Act B) Private Detective Act C) Private Security Services Industry Act D) Private Security Agencies Act
A) License to Operate B) License to Organize C) License to Observe D) License to Officiate
A) License to Establish Security Profession B) License to Employ Security Professionals C) License to Enlist Security Personnel D) License to Exercise Security Profession
A) RA 10591 B) RA 5487 C) RA 9184 D) RA 7031
A) Chief of the Philippine National Police (PNP) or authorized representative B) Department of Labor and Employment (DOLE) C) Department of Interior and Local Government (DILG) D) Department of Justice
A) Any government police force B) Only K9-unit handlers C) Only persons providing alarm system monitoring D) Any person or juridical entity that recruits/security guards for hire
A) None — license is automatic B) Must be at least 30 years old C) Must own a security agency D) Must undergo pre-licensing training program
A) 2 years B) 5 years C) 3 years D) 4 years
A) 10% B) 25% C) 20% D) 15%
A) No, juridical entities are excluded B) No, only individuals can apply C) Yes, but only foreign-owned ones D) Yes, if wholly Filipino-owned and controlled
A) Private detective agencies B) CCTV hardware suppliers and operations C) Security training agencies D) Government police patrol units
A) True B) False
A) Using force to influence elections B) Hiring only Filipino citizens C) Operating without firearms D) Charging administrative fee of 20%
A) On-the-job training only B) No training required C) D.Training only for K9 handlers D) Pre-Licensing Training Programs
A) Any person who works as a guard without license B) Persons issued a valid LESP after satisfying requirements C) Only members of the Armed Forces of the Philippines D) Government investigators on
A) All of the above B) Security guards and watchmen C) Security consultants and system designers D) Private investigators and K9 handlers
A) Nothing — just a form B) A security deposit with the client C) Proof of previous experience only D) A bond issued by an accredited surety or insurance company
A) To deregulate private security industry B) To limit the role of private security to non-critical establishments only C) To strengthen regulation and establish quality standards for private security services D) D To nationalize all private security agencies
A) No — limit is 1,000 B) Yes — there is no limit C) No — limit is 2,000 D) Yes — but only if foreign-owned
A) RA 7721 (1989 Polaris Law) B) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act) C) RA 6713 (Code of Conduct and Ethical Standards) D) RA 9165 (Comprehensive Dangerous Drugs Act)
A) Both A and B B) None of the above C) Security Officers Training Course D) Basic Security Guard Course
A) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA B) Any school — public or private — regardless of accreditation C) Foreign training institutions only D) Only the PNP itself
A) False B) True
A) Automatic cancellation without fine B) No penalty C) Must reapply in 1 year only D) Fine between ₱50,000 and ₱100,000
A) Allowed to perform law enforcement duties with full police powers B) Exempt from training requirements C) Competent and able to complement law enforcement authorities in maintaining peace and order D) Equipped with firearms only
A) Continue the inspection silently B) Explain the policy politely and perform the inspection professionally C) Refer the customer to HR D) Ignore the complaint
A) Tell other guards verbally only B) Confront him aggressively C) Ignore it unless a crime happens D) Report to your supervisor and document the behavior
A) Activate the alarm and assist evacuation B) Call the media C) Panic and run D) Lock the doors
A) Deny entry following access control procedure B) Argue with the visitor C) Let them enter since they look trustworthy D) Ignore protocol for VIPs
A) Turn off the CCTV B) Approach immediately without backup C) Record the incident and notify the security manager D) Post the footage online
A) Check bags without permission B) Perform checks silently C) Greet customers and explain procedures briefly D) Avoid eye contac
A) Kick it to check for noise B) Move it to the office C) Open it immediately D) Establish a perimeter and report it
A) Tell them to search again B) Immediately deactivate the card and issue a temporary one C) Allow entry without identification D) Ignore the report
A) Destroy old footage B) Accuse the suspect instantly C) Gather evidence, review CCTV, and interview witnesses D) Avoid writing a report
A) Shout to maintain order B) Close the entrance C) Manage lines and communicate delays politely D) Allow skipping procedures
A) Manage lines and communicate delays politely B) Close the entrance C) Allow skipping procedures D) Shout to maintain order
A) Lock the building permanently B) Strengthen perimeter checks and brief the team C) Ignore the intelligence D) Cancel all work
A) Assist them courteously B) Walk away C) Tell them it’s not your job D) Point them in the wrong direction
A) Record it for personal use B) Report and correct the violation professionally C) Ignore it D) Join them
A) Ignore standard procedure B) Let them unload freely C) Verify documents and confirm with the office D) Allow entry immediately
A) Leave evidence unsecured B) Let witnesses hold the item C) Document all handlers of evidence clearly D) Pass evidence to anyone available
A) Remove the camera yourself B) Ignore the issue C) Cover it D) Report and record the malfunction immediately
A) Ask for autographs B) Provide guided access within protocol C) Let them pass unscreened D) Skip screening
A) Use force immediately B) Guide movements and maintain clear communication C) Allow overcrowding D) Block all exits
A) Spread the information immediately B) Ignore all intel C) Assume it’s false D) Analyze, verify, and confirm through reliable sources
A) Argue back B) Use force immediately C) Maintain calm and de-escalate the situation D) Shout at them
A) Call medical assistance and perform basic first aid B) Crowd around the victim C) Panic D) Move the victim without assessment
A) Ignore it B) Provide the information C) Give false details D) Politely decline and report the inquiry
A) Throw them in open bins B) Give copies to all employees C) Use secure storage and control access D) Leave documents on your desk
A) Post the threat online B) Keep the caller talking, record details, and notify authorities C) Hang up immediately D) Ignore it
A) Add personal opinions B) Submit reports without details C) Document facts clearly, chronologically, and objectively D) Delay the report for days
A) CCTV placement map B) Risk impact matrix C) Organizational chart D) Interview checklist
A) Conducting background checks B) Installing lighting and surveillance C) Issuing ID badges D) Posting emergency hotlines
A) Issuing visitor passes B) Providing annual training C) Hiring only referrals D) Conducting random integrity testing
A) Allowing unlimited photocopying B) Locking cabinets and applying access logs C) Filing documents alphabetically D) Placing all documents in open shelves
A) Allow all employees to bring any USB B) Disable all USB ports permanently C) Encourage file transfers via social media D) Require encrypted USB devices and scanning
A) Preparing the annual budget B) Evaluating insurance policies C) Drafting job descriptions D) Listing all possible internal and external threats
A) Organizational mission-vision B) Risk probability-impact matrix C) Duty roster D) Security guard post order
A) Allowing visitors to roam freely B) Open-door policy for transparency C) Implementing biometric access control D) Enhancing office décor
A) Adequate lighting and patrols B) Offering valet parking C) Tree planting D) Directional signs only
A) Permanently locking all exits B) Installing exit alarms and panic bars C) Removing all emergency exit doors D) Posting "Do Not Enter" signs
A) Displaying documents on bulletin boards B) Keeping confidential files in fire-resistant safes C) Using color coding for case folders D) Allowing interns unrestricted access
A) Relocating operations to an alternate site B) Updating organizational charts C) Closing all branches temporarily D) Conducting team building
A) Add more posters on policies B) Provide umbrellas for visitors C) Remove all physical barriers D) Install turnstiles with access control
A) Risk assessment and analysis B) Monitoring guards' attendance C) Budget allocation D) Risk avoidance
A) Removing passwords B) Applying encryption and multi-factor authentication C) Using unverified public Wi-Fi D) Sending drafts to social media inboxes
A) General orientation lectures B) Evacuation and response drills C) Flexible work hours D) Salary increase program
A) Reviewing financial reports B) Performing penetration testing C) Listening to employee complaints D) Rearranging inventory
A) Trust referrals without checks B) Give them master keys C) Issue limited access IDs and monitor activities D) Allow them full system access
A) Decorative labels B) No markings to avoid suspicion C) Color-blind friendly icons D) “Confidential,” “Secret,” and “Restricted” stamps
A) VPN and secure company devices B) Personal email accounts C) Any software they prefer D) Open public Wi-Fi
A) Eliminating CCTV monitoring B) Enhancing barriers, lighting, and patrols C) Reducing guard deployment D) Increasing the number of blind spots
A) Removing antivirus software B) Implementing daily data backups C) Playing music during work D) Cmm Giving more breaks
A) Reviewing guard logs and observing actual posts B) Ignoring irregularities found C) Looking only at CCTV footage D) Asking only senior guards for input
A) Rely solely on CCTV B) Remove barriers to ensure smooth flow C) Allow guests to enter without screening D) Establish access control points and metal detectors
A) Lay off all employees B) Create a work-from-home and rotation plan C) Cancel all IT support D) Lock all offices without notice
A) Natural Surveillance B) Access Control C) Territorial Reinforcement D) Maintenance
A) Decorative landscaping B) High interior walls C) Clearly marked exit routes D) Multiple concealed corridors
A) Residential zones with active barangay patrols B) Commercial districts with regulated lighting C) Mixed-use areas with pedestrian flow D) High-crime clusters near abandoned structures
A) Interior signage B) Blast stand-off distance C) Employee comfort spaces D) Perimeter painting
A) Plain glass windows B) Decorative fences C) Carpeted hallways D) Motion-activated lighting
A) Walkways monitored by CCTV B) Pathways near visible public spaces C) Narrow alleys with poor lighting D) Open parks with community presence
A) Rooftop slope B) Wall color C) Window size D) Light distribution and shadow analysis
A) Enhanced visitor experience B) Strong perimeter control C) High community engagement D) Poor access management
A) Public decorations B) Billboard placement C) Sidewalk artistry D) Road network connectivity
A) C Information security B) Natural surveillance C) Access control D) Soft landscaping
A) Parking façade B) Outdoor recreation area C) Core administrative area D) Reception lobby
A) Walls improve natural lighting B) Walls encourage community bonding C) Walls without monitoring create blind spots D) High barriers eliminate all threats
A) Provides resistance to forced entry B) Fades sunlight exposure C) Breaks easily for ventilation D) Reduces electricity consumption
A) Areas with community events B) Active commercial zones C) High-visibility parks D) Areas with poor maintenance ("broken windows")
A) CCTV automatically brightens footage B) CCTV becomes ineffective due to darkness C) CCTV makes lighting unnecessary D) CCTV compensates fully for lighting
A) Visibility for approaching threats B) Structural stability C) Interior temperature D) Employee comfort
A) Helps determine paint colors B) Reduces real estate value C) Identifies crowding that may mask hostile intent D) Improves interior aesthetics
A) High walls + intrusion alarms B) Hidden entrances + poor lighting C) D CCTVs + guard patrols D) Glass doors + reinforced locks
A) Hidden escape routes in informal settlements B) Well-planned zoning C) Overly wide roads D) Pedestrian-friendly walkways
A) Visitor screening points B) Window design C) Furniture placement D) Employee morale
A) Height, strength, and placement B) Ability to blend with landscape C) Color scheme D) Aesthetic quality
A) Natural surveillance opportunities B) Landscaping efficiency C) Economic viability D) Employee punctuality
A) High environmental safety B) Improved traffic efficiency C) Increased social interaction D) Elevated hazard and accident risk
A) Decorative appeal B) Visibility of approaching individuals C) Noise reduction D) Temperature control |