LEA3-ISAMANA
  • 1. What is the short title of RA 11917?
A) Private Security Agencies Act
B) Private Detective Act
C) Security Guard Regulation Act
D) Private Security Services Industry Act
  • 2. What does the acronym “LTO” stand for in RA 11917?
A) License to Operate
B) License to Officiate
C) License to Observe
D) License to Organize
  • 3. What does “LESP” refer to under RA 11917?
A) License to Exercise Security Profession
B) License to Establish Security Profession
C) License to Employ Security Professionals
D) License to Enlist Security Personnel
  • 4. Which existing law is repealed by RA 11917?
A) RA 10591
B) RA 5487
C) RA 7031
D) RA 9184
  • 5. Who issues the LTO or LESP under RA 11917?
A) Department of Labor and Employment (DOLE)
B) Chief of the Philippine National Police (PNP) or authorized representative
C) Department of Justice
D) Department of Interior and Local Government (DILG)
  • 6. Which of the following is considered a “Private Security Agency (PSA)” under RA 11917?
A) Any government police force
B) Any person or juridical entity that recruits/security guards for hire
C) Only persons providing alarm system monitoring
D) Only K9-unit handlers
  • 7. What is required before a person can be granted a LESP?
A) None — license is automatic
B) Must own a security agency
C) Must be at least 30 years old
D) Must undergo pre-licensing training program
  • 8. How long is a valid LESP issued under RA 11917 (subject to renewal)?
A) 3 years
B) 4 years
C) 5 years
D) 2 years
  • 9. What is the minimum administrative fee that a PSA may charge its clients (as a percentage of contract cost)?
A) 25%
B) 20%
C) 10%
D) 15%
  • 10. Can a juridical entity (corporation) apply for a License to Operate (LTO) under RA 11917?
A) Yes, if wholly Filipino-owned and controlled
B) Yes, but only foreign-owned ones
C) No, juridical entities are excluded
D) No, only individuals can apply
  • 11. Which among the following is NOT part of the “Private Security Industry” as defined in RA 11917?
A) Security training agencies
B) Private detective agencies
C) CCTV hardware suppliers and operations
D) Government police patrol units
  • 12. True or False: A PSA may remain valid indefinitely once it obtains an LTO.
A) False
B) True
  • 13. Which of the following is a ground for cancellation or suspension of a PSA’s license under RA 11917?
A) Charging administrative fee of 20%
B) Hiring only Filipino citizens
C) Operating without firearms
D) Using force to influence elections
  • 14. What kind of training programs does RA 11917 require before practice?
A) No training required
B) D.Training only for K9 handlers
C) Pre-Licensing Training Programs
D) On-the-job training only
  • 15. Under RA 11917, who qualifies as a “Private Security Professional (PSP)”?
A) Any person who works as a guard without license
B) Only members of the Armed Forces of the Philippines
C) Government investigators on
D) Persons issued a valid LESP after satisfying requirements
  • 16. Which of the following is included among the possible roles under PSP as defined by RA 11917?
A) Security consultants and system designers
B) Private investigators and K9 handlers
C) Security guards and watchmen
D) All of the above
  • 17. What must accompany an application for LTO under RA 11917?
A) Nothing — just a form
B) A security deposit with the client
C) A bond issued by an accredited surety or insurance company
D) Proof of previous experience only
  • 18. Which of the following is a declared policy of the State under RA 11917?
A) To limit the role of private security to non-critical establishments only
B) To deregulate private security industry
C) D To nationalize all private security agencies
D) To strengthen regulation and establish quality standards for private security services
  • 19. Can a private security agency deploy more than 2,000 security professionals under RA 11917?
A) Yes — there is no limit
B) Yes — but only if foreign-owned
C) No — limit is 2,000
D) No — limit is 1,000
  • 20. Which law does RA 11917 reference when allowing issuance of firearms to PSAs under certain conditions?
A) RA 7721 (1989 Polaris Law)
B) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act)
C) RA 6713 (Code of Conduct and Ethical Standards)
D) RA 9165 (Comprehensive Dangerous Drugs Act)
  • 21. Pre-licensing training under RA 11917 may include which of the following courses?
A) Security Officers Training Course
B) Basic Security Guard Course
C) Both A and B
D) None of the above
  • 22. Who among the following may be granted LTO for a Private Security Training Agency (PSTA)?
A) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA
B) Any school — public or private — regardless of accreditation
C) Only the PNP itself
D) Foreign training institutions only
  • 23. True or False: Under RA 11917, a person who renders private security services without a valid LESP may be penalized.
A) True
B) False
  • 24. What happens if a PSA operates with an expired LTO under RA 11917?
A) Must reapply in 1 year only
B) Fine between ₱50,000 and ₱100,000
C) No penalty
D) Automatic cancellation without fine
  • 25. The purpose of RA 11917 includes ensuring that private security personnel are?
A) Competent and able to complement law enforcement authorities in maintaining peace and order
B) Allowed to perform law enforcement duties with full police powers
C) Equipped with firearms only
D) Exempt from training requirements
  • 26. A customer complains about a bag inspection at the gate. As a security officer, what is the most appropriate action to apply customer-relations skills?
A) Continue the inspection silently
B) Explain the policy politely and perform the inspection professionally
C) Ignore the complaint
D) Refer the customer to HR
  • 27. You receive information about a suspicious individual frequently surveying the perimeter. What is your best immediate application of security protocol?
A) Ignore it unless a crime happens
B) Confront him aggressively
C) Report to your supervisor and document the behavior
D) Tell other guards verbally only
  • 28. A fire breaks out in a storage room. What should the security officer apply first?
A) Call the media
B) Lock the doors
C) Panic and run
D) Activate the alarm and assist evacuation
  • 29. A visitor refuses to sign the logbook. What should you apply to handle the situation?
A) Argue with the visitor
B) Ignore protocol for VIPs
C) Deny entry following access control procedure
D) Let them enter since they look trustworthy
  • 30. While on CCTV monitoring, you observe an employee frequently accessing restricted areas. What is your best action?
A) Approach immediately without backup
B) Turn off the CCTV
C) Post the footage online
D) Record the incident and notify the security manager
  • 31. To apply customer service skills during security checks, what should you do?
A) Check bags without permission
B) Avoid eye contac
C) Perform checks silently
D) Greet customers and explain procedures briefly
  • 32. You find a suspicious unattended bag in the lobby. What protocol should you apply?
A) Kick it to check for noise
B) Move it to the office
C) Open it immediately
D) Establish a perimeter and report it
  • 33. An employee reports a lost access card. What should you apply?
A) Allow entry without identification
B) Ignore the report
C) Tell them to search again
D) Immediately deactivate the card and issue a temporary one
  • 34. You are investigating a theft. What is the best application of corporate investigation skills?
A) Destroy old footage
B) Avoid writing a report
C) Gather evidence, review CCTV, and interview witnesses
D) Accuse the suspect instantly
  • 35. During peak hours, people become impatient at security queues. What should you apply?
A) Shout to maintain order
B) Close the entrance
C) Allow skipping procedures
D) Manage lines and communicate delays politely
  • 36. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Manage lines and communicate delays politely
B) Close the entrance
C) Allow skipping procedures
D) Shout to maintain order
  • 37. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Strengthen perimeter checks and brief the team
B) Cancel all work
C) Ignore the intelligence
D) Lock the building permanently
  • 38. While patrolling, a customer asks for directions. What customer-relations skill do you apply?
A) Walk away
B) Assist them courteously
C) Point them in the wrong direction
D) Tell them it’s not your job
  • 39. A co-worker is violating safety rules. What should you apply?
A) Report and correct the violation professionally
B) Record it for personal use
C) Join them
D) Ignore it
  • 40. A delivery truck arrives without prior notice. What protocol should you apply?
A) Verify documents and confirm with the office
B) Allow entry immediately
C) Ignore standard procedure
D) Let them unload freely
  • 41. During an investigation, you must ensure chain of custody. How do you apply this?
A) Document all handlers of evidence clearly
B) Pass evidence to anyone available
C) Leave evidence unsecured
D) Let witnesses hold the item
  • 42. You notice a CCTV camera malfunctioning. What should you apply?
A) Report and record the malfunction immediately
B) Remove the camera yourself
C) Cover it
D) Ignore the issue
  • 43. A VIP arrives at the premises. What should you do to apply security and customer service?
A) Skip screening
B) Ask for autographs
C) Provide guided access within protocol
D) Let them pass unscreened
  • 44. You are assigned to crowd control during an event. What should you apply?
A) Block all exits
B) Guide movements and maintain clear communication
C) Allow overcrowding
D) Use force immediately
  • 45. A colleague provides unverified information about a potential threat. What is the correct application of intelligence validation?
A) Assume it’s false
B) Ignore all intel
C) Spread the information immediately
D) Analyze, verify, and confirm through reliable sources
  • 46. A customer becomes verbally aggressive. What should you apply?
A) Shout at them
B) Use force immediately
C) Argue back
D) Maintain calm and de-escalate the situation
  • 47. During a medical emergency, what should you apply first?
A) Panic
B) Crowd around the victim
C) Call medical assistance and perform basic first aid
D) Move the victim without assessment
  • 48. A suspicious person asks questions about shift schedules. What should you apply?
A) Give false details
B) Provide the information
C) Politely decline and report the inquiry
D) Ignore it
  • 49. You are tasked to secure sensitive corporate documents. What should you apply?
A) Give copies to all employees
B) Use secure storage and control access
C) Throw them in open bins
D) Leave documents on your desk
  • 50. The building receives a bomb threat via phone. What should you apply?
A) Keep the caller talking, record details, and notify authorities
B) Post the threat online
C) Hang up immediately
D) Ignore it
  • 51. You are to apply proper incident reporting. What should you do?
A) Document facts clearly, chronologically, and objectively
B) Delay the report for days
C) Add personal opinions
D) Submit reports without details
  • 52. During a security survey, you are tasked to verify blind spots in a warehouse. Which tool should you apply to best identify these vulnerable areas?
A) Interview checklist
B) CCTV placement map
C) Organizational chart
D) Risk impact matrix
  • 53. To apply physical security principles, which measure should you implement first when securing a newly constructed perimeter fence?
A) Conducting background checks
B) Issuing ID badges
C) Installing lighting and surveillance
D) Posting emergency hotlines
  • 54. When creating a personnel security plan, which of the following actions best applies the principle of “trust but verify”?
A) Hiring only referrals
B) Providing annual training
C) Conducting random integrity testing
D) Issuing visitor passes
  • 55. A company wants to secure confidential files stored in cabinets. Which application of document security is MOST appropriate?
A) Locking cabinets and applying access logs
B) Placing all documents in open shelves
C) Filing documents alphabetically
D) Allowing unlimited photocopying
  • 56. To apply information security protocols in an office with frequent USB use, what should you implement?
A) Encourage file transfers via social media
B) Allow all employees to bring any USB
C) Disable all USB ports permanently
D) Require encrypted USB devices and scanning
  • 57. You are asked to conduct a threat assessment for a bank. Which step best applies risk identification?
A) Evaluating insurance policies
B) Preparing the annual budget
C) Listing all possible internal and external threats
D) Drafting job descriptions
  • 58. To determine which risks should be addressed first, which tool should be applied?
A) Organizational mission-vision
B) Risk probability-impact matrix
C) Duty roster
D) Security guard post order
  • 59. The HR office wants to limit unauthorized access. Which application of personnel security is MOST effective?
A) Open-door policy for transparency
B) Allowing visitors to roam freely
C) Implementing biometric access control
D) Enhancing office décor
  • 60. When applying physical security in parking areas, which measure provides the strongest deterrence?
A) Tree planting
B) Adequate lighting and patrols
C) Offering valet parking
D) Directional signs only
  • 61. During a security survey, you identify several unsecured emergency exits. What should you apply to correct the issue without violating safety codes?
A) Installing exit alarms and panic bars
B) Posting "Do Not Enter" signs
C) Removing all emergency exit doors
D) Permanently locking all exits
  • 62. What is the correct application of document security in a legal department?
A) Displaying documents on bulletin boards
B) Keeping confidential files in fire-resistant safes
C) Allowing interns unrestricted access
D) Using color coding for case folders
  • 63. When applying BCM, which action ensures critical operations continue after a fire?
A) Conducting team building
B) Relocating operations to an alternate site
C) Closing all branches temporarily
D) Updating organizational charts
  • 64. A company wants to prevent tailgating at entrances. Which measure should you apply?
A) Add more posters on policies
B) Remove all physical barriers
C) Provide umbrellas for visitors
D) Install turnstiles with access control
  • 65. In applying risk management, which step follows risk identification?
A) Budget allocation
B) Risk assessment and analysis
C) Monitoring guards' attendance
D) Risk avoidance
  • 66. Which is an applied method to protect information transmitted through email?
A) Applying encryption and multi-factor authentication
B) Sending drafts to social media inboxes
C) Removing passwords
D) Using unverified public Wi-Fi
  • 67. A security manager must ensure all staff understand emergency roles. Which BCM component should be applied?
A) Flexible work hours
B) Salary increase program
C) General orientation lectures
D) Evacuation and response drills
  • 68. When conducting a security survey of a storage facility, what applied method determines the effectiveness of locks?
A) Performing penetration testing
B) Rearranging inventory
C) Listening to employee complaints
D) Reviewing financial reports
  • 69. Applying personnel security, how should temporary workers be managed
A) Give them master keys
B) Allow them full system access
C) Issue limited access IDs and monitor activities
D) Trust referrals without checks
  • 70. When applying document security for classified materials, which marking system should be used?
A) “Confidential,” “Secret,” and “Restricted” stamps
B) No markings to avoid suspicion
C) Color-blind friendly icons
D) Decorative labels
  • 71. To apply information security during remote work, what should employees use?
A) VPN and secure company devices
B) Open public Wi-Fi
C) Personal email accounts
D) Any software they prefer
  • 72. In risk management, which applied strategy reduces the likelihood of intrusion?
A) Reducing guard deployment
B) Eliminating CCTV monitoring
C) Increasing the number of blind spots
D) Enhancing barriers, lighting, and patrols
  • 73. Which BCM action ensures quick restoration of digital records after system failure?
A) Cmm Giving more breaks
B) Removing antivirus software
C) Implementing daily data backups
D) Playing music during work
  • 74. What is the correct application of a security survey to improve guard performance
A) Ignoring irregularities found
B) Reviewing guard logs and observing actual posts
C) Looking only at CCTV footage
D) Asking only senior guards for input
  • 75. To apply physical security for a VIP event, which measure is MOST appropriate?
A) Remove barriers to ensure smooth flow
B) Rely solely on CCTV
C) Establish access control points and metal detectors
D) Allow guests to enter without screening
  • 76. A company must ensure operations continue during a pandemic. Which BCM strategy should be applied?
A) Cancel all IT support
B) Lay off all employees
C) Lock all offices without notice
D) Create a work-from-home and rotation plan
  • 77. Which principle of Crime Prevention Through Environmental Design (CPTED) is best applied when analyzing how transparent store-front windows reduce concealment zones?
A) Access Control
B) Natural Surveillance
C) Territorial Reinforcement
D) Maintenance
  • 78. When evaluating a building layout, which design feature most effectively integrates architectural security with emergency egress analysis?
A) High interior walls
B) Clearly marked exit routes
C) Decorative landscaping
D) Multiple concealed corridors
  • 79. In analyzing urban planning risks, which pattern indicates ineffective zoning related to crime concentration?
A) Residential zones with active barangay patrols
B) Commercial districts with regulated lighting
C) Mixed-use areas with pedestrian flow
D) High-crime clusters near abandoned structures
  • 80. A facility’s main entrance is exposed to direct vehicle access from a public road. Which security concept should be analyzed to mitigate vehicle-borne threats?
A) Employee comfort spaces
B) Blast stand-off distance
C) Interior signage
D) Perimeter painting
  • 81. Which architectural element provides both deterrence and detection when evaluating layered security?
A) Plain glass windows
B) Carpeted hallways
C) Decorative fences
D) Motion-activated lighting
  • 82. When analyzing pathways in urban design, which condition most increases risk according to CPTED?
A) Pathways near visible public spaces
B) Open parks with community presence
C) Narrow alleys with poor lighting
D) Walkways monitored by CCTV
  • 83. A security planner is assessing how building orientation affects nighttime risks. Which factor is most critical?
A) Window size
B) Light distribution and shadow analysis
C) Wall color
D) Rooftop slope
  • 84. In physical security analysis, what does the presence of multiple unlocked access doors indicate?
A) Strong perimeter control
B) Poor access management
C) Enhanced visitor experience
D) High community engagement
  • 85. Which urban planning factor most affects emergency response time analysis?
A) Road network connectivity
B) Billboard placement
C) Public decorations
D) Sidewalk artistry
  • 86. Analyzing the effectiveness of bollards in a building’s perimeter relates to which security function?
A) Soft landscaping
B) C Information security
C) Access control
D) Natural surveillance
  • 87. When assessing a security zone plan, which area is most vulnerable if mixed with unrestricted public space?
A) Reception lobby
B) Outdoor recreation area
C) Parking façade
D) Core administrative area
  • 88. A facility uses high walls but lacks surveillance. What analysis best explains this weakness?
A) High barriers eliminate all threats
B) Walls without monitoring create blind spots
C) Walls encourage community bonding
D) Walls improve natural lighting
  • 89. In analyzing building materials for security, laminated glass is preferred because it:
A) Provides resistance to forced entry
B) Fades sunlight exposure
C) Breaks easily for ventilation
D) Reduces electricity consumption
  • 90. When analyzing urban crime patterns, which environmental factor often correlates with increased vandalism?
A) Active commercial zones
B) Areas with poor maintenance ("broken windows")
C) High-visibility parks
D) Areas with community events
  • 91. If a facility has excellent CCTV but poor lighting, what can be concluded?
A) CCTV becomes ineffective due to darkness
B) CCTV makes lighting unnecessary
C) CCTV automatically brightens footage
D) CCTV compensates fully for lighting
  • 92. A building entrance facing a blind corner increases risk because it reduces:
A) Visibility for approaching threats
B) Interior temperature
C) Structural stability
D) Employee comfort
  • 93. Analyzing pedestrian traffic flow is essential in security planning because it:
A) Reduces real estate value
B) Improves interior aesthetics
C) Identifies crowding that may mask hostile intent
D) Helps determine paint colors
  • 94. In physical security evaluation, which combination increases intrusion risk?
A) D CCTVs + guard patrols
B) High walls + intrusion alarms
C) Glass doors + reinforced locks
D) Hidden entrances + poor lighting
  • 95. Which urban design flaw most contributes to crime displacement analysis?
A) Hidden escape routes in informal settlements
B) Overly wide roads
C) Pedestrian-friendly walkways
D) Well-planned zoning
  • 96. The absence of a defined perimeter in architectural design makes it most difficult to analyze:
A) Window design
B) Visitor screening points
C) Furniture placement
D) Employee morale
  • 97. When analyzing physical barriers, which factor most determines their effectiveness?
A) Color scheme
B) Height, strength, and placement
C) Aesthetic quality
D) Ability to blend with landscape
  • 98. A poorly lit parking area is high-risk primarily because it reduces:
A) Employee punctuality
B) Natural surveillance opportunities
C) Economic viability
D) Landscaping efficiency
  • 99. What can be inferred when pedestrian walkways intersect with high-speed traffic lanes?
A) Increased social interaction
B) Improved traffic efficiency
C) Elevated hazard and accident risk
D) High environmental safety
  • 100. If a building uses reflective surfaces at entrances, analysis shows it enhances security by improving:
A) Noise reduction
B) Visibility of approaching individuals
C) Temperature control
D) Decorative appeal
Created with That Quiz — the site for test creation and grading in math and other subjects.