LEA3-ISAMANA
  • 1. What is the short title of RA 11917?
A) Security Guard Regulation Act
B) Private Security Services Industry Act
C) Private Security Agencies Act
D) Private Detective Act
  • 2. What does the acronym “LTO” stand for in RA 11917?
A) License to Operate
B) License to Officiate
C) License to Observe
D) License to Organize
  • 3. What does “LESP” refer to under RA 11917?
A) License to Exercise Security Profession
B) License to Employ Security Professionals
C) License to Enlist Security Personnel
D) License to Establish Security Profession
  • 4. Which existing law is repealed by RA 11917?
A) RA 5487
B) RA 10591
C) RA 9184
D) RA 7031
  • 5. Who issues the LTO or LESP under RA 11917?
A) Chief of the Philippine National Police (PNP) or authorized representative
B) Department of Interior and Local Government (DILG)
C) Department of Labor and Employment (DOLE)
D) Department of Justice
  • 6. Which of the following is considered a “Private Security Agency (PSA)” under RA 11917?
A) Only K9-unit handlers
B) Any government police force
C) Any person or juridical entity that recruits/security guards for hire
D) Only persons providing alarm system monitoring
  • 7. What is required before a person can be granted a LESP?
A) Must undergo pre-licensing training program
B) Must own a security agency
C) None — license is automatic
D) Must be at least 30 years old
  • 8. How long is a valid LESP issued under RA 11917 (subject to renewal)?
A) 4 years
B) 5 years
C) 2 years
D) 3 years
  • 9. What is the minimum administrative fee that a PSA may charge its clients (as a percentage of contract cost)?
A) 15%
B) 20%
C) 25%
D) 10%
  • 10. Can a juridical entity (corporation) apply for a License to Operate (LTO) under RA 11917?
A) Yes, if wholly Filipino-owned and controlled
B) Yes, but only foreign-owned ones
C) No, juridical entities are excluded
D) No, only individuals can apply
  • 11. Which among the following is NOT part of the “Private Security Industry” as defined in RA 11917?
A) CCTV hardware suppliers and operations
B) Private detective agencies
C) Security training agencies
D) Government police patrol units
  • 12. True or False: A PSA may remain valid indefinitely once it obtains an LTO.
A) False
B) True
  • 13. Which of the following is a ground for cancellation or suspension of a PSA’s license under RA 11917?
A) Charging administrative fee of 20%
B) Hiring only Filipino citizens
C) Using force to influence elections
D) Operating without firearms
  • 14. What kind of training programs does RA 11917 require before practice?
A) Pre-Licensing Training Programs
B) D.Training only for K9 handlers
C) On-the-job training only
D) No training required
  • 15. Under RA 11917, who qualifies as a “Private Security Professional (PSP)”?
A) Persons issued a valid LESP after satisfying requirements
B) Any person who works as a guard without license
C) Only members of the Armed Forces of the Philippines
D) Government investigators on
  • 16. Which of the following is included among the possible roles under PSP as defined by RA 11917?
A) All of the above
B) Private investigators and K9 handlers
C) Security consultants and system designers
D) Security guards and watchmen
  • 17. What must accompany an application for LTO under RA 11917?
A) A bond issued by an accredited surety or insurance company
B) A security deposit with the client
C) Proof of previous experience only
D) Nothing — just a form
  • 18. Which of the following is a declared policy of the State under RA 11917?
A) To strengthen regulation and establish quality standards for private security services
B) D To nationalize all private security agencies
C) To deregulate private security industry
D) To limit the role of private security to non-critical establishments only
  • 19. Can a private security agency deploy more than 2,000 security professionals under RA 11917?
A) Yes — but only if foreign-owned
B) Yes — there is no limit
C) No — limit is 1,000
D) No — limit is 2,000
  • 20. Which law does RA 11917 reference when allowing issuance of firearms to PSAs under certain conditions?
A) RA 6713 (Code of Conduct and Ethical Standards)
B) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act)
C) RA 7721 (1989 Polaris Law)
D) RA 9165 (Comprehensive Dangerous Drugs Act)
  • 21. Pre-licensing training under RA 11917 may include which of the following courses?
A) None of the above
B) Basic Security Guard Course
C) Security Officers Training Course
D) Both A and B
  • 22. Who among the following may be granted LTO for a Private Security Training Agency (PSTA)?
A) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA
B) Only the PNP itself
C) Any school — public or private — regardless of accreditation
D) Foreign training institutions only
  • 23. True or False: Under RA 11917, a person who renders private security services without a valid LESP may be penalized.
A) True
B) False
  • 24. What happens if a PSA operates with an expired LTO under RA 11917?
A) Fine between ₱50,000 and ₱100,000
B) Must reapply in 1 year only
C) Automatic cancellation without fine
D) No penalty
  • 25. The purpose of RA 11917 includes ensuring that private security personnel are?
A) Exempt from training requirements
B) Equipped with firearms only
C) Competent and able to complement law enforcement authorities in maintaining peace and order
D) Allowed to perform law enforcement duties with full police powers
  • 26. A customer complains about a bag inspection at the gate. As a security officer, what is the most appropriate action to apply customer-relations skills?
A) Refer the customer to HR
B) Ignore the complaint
C) Explain the policy politely and perform the inspection professionally
D) Continue the inspection silently
  • 27. You receive information about a suspicious individual frequently surveying the perimeter. What is your best immediate application of security protocol?
A) Confront him aggressively
B) Report to your supervisor and document the behavior
C) Tell other guards verbally only
D) Ignore it unless a crime happens
  • 28. A fire breaks out in a storage room. What should the security officer apply first?
A) Panic and run
B) Lock the doors
C) Call the media
D) Activate the alarm and assist evacuation
  • 29. A visitor refuses to sign the logbook. What should you apply to handle the situation?
A) Let them enter since they look trustworthy
B) Deny entry following access control procedure
C) Ignore protocol for VIPs
D) Argue with the visitor
  • 30. While on CCTV monitoring, you observe an employee frequently accessing restricted areas. What is your best action?
A) Approach immediately without backup
B) Turn off the CCTV
C) Post the footage online
D) Record the incident and notify the security manager
  • 31. To apply customer service skills during security checks, what should you do?
A) Check bags without permission
B) Perform checks silently
C) Avoid eye contac
D) Greet customers and explain procedures briefly
  • 32. You find a suspicious unattended bag in the lobby. What protocol should you apply?
A) Open it immediately
B) Establish a perimeter and report it
C) Move it to the office
D) Kick it to check for noise
  • 33. An employee reports a lost access card. What should you apply?
A) Tell them to search again
B) Ignore the report
C) Allow entry without identification
D) Immediately deactivate the card and issue a temporary one
  • 34. You are investigating a theft. What is the best application of corporate investigation skills?
A) Accuse the suspect instantly
B) Destroy old footage
C) Avoid writing a report
D) Gather evidence, review CCTV, and interview witnesses
  • 35. During peak hours, people become impatient at security queues. What should you apply?
A) Manage lines and communicate delays politely
B) Allow skipping procedures
C) Close the entrance
D) Shout to maintain order
  • 36. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Manage lines and communicate delays politely
B) Allow skipping procedures
C) Shout to maintain order
D) Close the entrance
  • 37. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Ignore the intelligence
B) Cancel all work
C) Lock the building permanently
D) Strengthen perimeter checks and brief the team
  • 38. While patrolling, a customer asks for directions. What customer-relations skill do you apply?
A) Assist them courteously
B) Point them in the wrong direction
C) Walk away
D) Tell them it’s not your job
  • 39. A co-worker is violating safety rules. What should you apply?
A) Report and correct the violation professionally
B) Ignore it
C) Join them
D) Record it for personal use
  • 40. A delivery truck arrives without prior notice. What protocol should you apply?
A) Allow entry immediately
B) Verify documents and confirm with the office
C) Ignore standard procedure
D) Let them unload freely
  • 41. During an investigation, you must ensure chain of custody. How do you apply this?
A) Let witnesses hold the item
B) Pass evidence to anyone available
C) Leave evidence unsecured
D) Document all handlers of evidence clearly
  • 42. You notice a CCTV camera malfunctioning. What should you apply?
A) Report and record the malfunction immediately
B) Remove the camera yourself
C) Ignore the issue
D) Cover it
  • 43. A VIP arrives at the premises. What should you do to apply security and customer service?
A) Ask for autographs
B) Let them pass unscreened
C) Skip screening
D) Provide guided access within protocol
  • 44. You are assigned to crowd control during an event. What should you apply?
A) Guide movements and maintain clear communication
B) Use force immediately
C) Block all exits
D) Allow overcrowding
  • 45. A colleague provides unverified information about a potential threat. What is the correct application of intelligence validation?
A) Spread the information immediately
B) Analyze, verify, and confirm through reliable sources
C) Ignore all intel
D) Assume it’s false
  • 46. A customer becomes verbally aggressive. What should you apply?
A) Shout at them
B) Maintain calm and de-escalate the situation
C) Use force immediately
D) Argue back
  • 47. During a medical emergency, what should you apply first?
A) Move the victim without assessment
B) Panic
C) Crowd around the victim
D) Call medical assistance and perform basic first aid
  • 48. A suspicious person asks questions about shift schedules. What should you apply?
A) Give false details
B) Politely decline and report the inquiry
C) Provide the information
D) Ignore it
  • 49. You are tasked to secure sensitive corporate documents. What should you apply?
A) Throw them in open bins
B) Use secure storage and control access
C) Leave documents on your desk
D) Give copies to all employees
  • 50. The building receives a bomb threat via phone. What should you apply?
A) Hang up immediately
B) Keep the caller talking, record details, and notify authorities
C) Post the threat online
D) Ignore it
  • 51. You are to apply proper incident reporting. What should you do?
A) Delay the report for days
B) Submit reports without details
C) Document facts clearly, chronologically, and objectively
D) Add personal opinions
  • 52. During a security survey, you are tasked to verify blind spots in a warehouse. Which tool should you apply to best identify these vulnerable areas?
A) Interview checklist
B) Organizational chart
C) Risk impact matrix
D) CCTV placement map
  • 53. To apply physical security principles, which measure should you implement first when securing a newly constructed perimeter fence?
A) Posting emergency hotlines
B) Installing lighting and surveillance
C) Conducting background checks
D) Issuing ID badges
  • 54. When creating a personnel security plan, which of the following actions best applies the principle of “trust but verify”?
A) Hiring only referrals
B) Conducting random integrity testing
C) Issuing visitor passes
D) Providing annual training
  • 55. A company wants to secure confidential files stored in cabinets. Which application of document security is MOST appropriate?
A) Allowing unlimited photocopying
B) Locking cabinets and applying access logs
C) Filing documents alphabetically
D) Placing all documents in open shelves
  • 56. To apply information security protocols in an office with frequent USB use, what should you implement?
A) Allow all employees to bring any USB
B) Encourage file transfers via social media
C) Require encrypted USB devices and scanning
D) Disable all USB ports permanently
  • 57. You are asked to conduct a threat assessment for a bank. Which step best applies risk identification?
A) Preparing the annual budget
B) Drafting job descriptions
C) Listing all possible internal and external threats
D) Evaluating insurance policies
  • 58. To determine which risks should be addressed first, which tool should be applied?
A) Risk probability-impact matrix
B) Organizational mission-vision
C) Security guard post order
D) Duty roster
  • 59. The HR office wants to limit unauthorized access. Which application of personnel security is MOST effective?
A) Enhancing office décor
B) Allowing visitors to roam freely
C) Open-door policy for transparency
D) Implementing biometric access control
  • 60. When applying physical security in parking areas, which measure provides the strongest deterrence?
A) Offering valet parking
B) Tree planting
C) Directional signs only
D) Adequate lighting and patrols
  • 61. During a security survey, you identify several unsecured emergency exits. What should you apply to correct the issue without violating safety codes?
A) Posting "Do Not Enter" signs
B) Removing all emergency exit doors
C) Permanently locking all exits
D) Installing exit alarms and panic bars
  • 62. What is the correct application of document security in a legal department?
A) Allowing interns unrestricted access
B) Using color coding for case folders
C) Displaying documents on bulletin boards
D) Keeping confidential files in fire-resistant safes
  • 63. When applying BCM, which action ensures critical operations continue after a fire?
A) Closing all branches temporarily
B) Updating organizational charts
C) Conducting team building
D) Relocating operations to an alternate site
  • 64. A company wants to prevent tailgating at entrances. Which measure should you apply?
A) Add more posters on policies
B) Remove all physical barriers
C) Install turnstiles with access control
D) Provide umbrellas for visitors
  • 65. In applying risk management, which step follows risk identification?
A) Risk avoidance
B) Monitoring guards' attendance
C) Risk assessment and analysis
D) Budget allocation
  • 66. Which is an applied method to protect information transmitted through email?
A) Using unverified public Wi-Fi
B) Sending drafts to social media inboxes
C) Applying encryption and multi-factor authentication
D) Removing passwords
  • 67. A security manager must ensure all staff understand emergency roles. Which BCM component should be applied?
A) Evacuation and response drills
B) General orientation lectures
C) Salary increase program
D) Flexible work hours
  • 68. When conducting a security survey of a storage facility, what applied method determines the effectiveness of locks?
A) Reviewing financial reports
B) Listening to employee complaints
C) Performing penetration testing
D) Rearranging inventory
  • 69. Applying personnel security, how should temporary workers be managed
A) Allow them full system access
B) Issue limited access IDs and monitor activities
C) Trust referrals without checks
D) Give them master keys
  • 70. When applying document security for classified materials, which marking system should be used?
A) Decorative labels
B) “Confidential,” “Secret,” and “Restricted” stamps
C) No markings to avoid suspicion
D) Color-blind friendly icons
  • 71. To apply information security during remote work, what should employees use?
A) Any software they prefer
B) Open public Wi-Fi
C) Personal email accounts
D) VPN and secure company devices
  • 72. In risk management, which applied strategy reduces the likelihood of intrusion?
A) Eliminating CCTV monitoring
B) Enhancing barriers, lighting, and patrols
C) Increasing the number of blind spots
D) Reducing guard deployment
  • 73. Which BCM action ensures quick restoration of digital records after system failure?
A) Implementing daily data backups
B) Removing antivirus software
C) Cmm Giving more breaks
D) Playing music during work
  • 74. What is the correct application of a security survey to improve guard performance
A) Ignoring irregularities found
B) Reviewing guard logs and observing actual posts
C) Looking only at CCTV footage
D) Asking only senior guards for input
  • 75. To apply physical security for a VIP event, which measure is MOST appropriate?
A) Establish access control points and metal detectors
B) Allow guests to enter without screening
C) Remove barriers to ensure smooth flow
D) Rely solely on CCTV
  • 76. A company must ensure operations continue during a pandemic. Which BCM strategy should be applied?
A) Lay off all employees
B) Lock all offices without notice
C) Create a work-from-home and rotation plan
D) Cancel all IT support
  • 77. Which principle of Crime Prevention Through Environmental Design (CPTED) is best applied when analyzing how transparent store-front windows reduce concealment zones?
A) Natural Surveillance
B) Access Control
C) Territorial Reinforcement
D) Maintenance
  • 78. When evaluating a building layout, which design feature most effectively integrates architectural security with emergency egress analysis?
A) Decorative landscaping
B) Multiple concealed corridors
C) High interior walls
D) Clearly marked exit routes
  • 79. In analyzing urban planning risks, which pattern indicates ineffective zoning related to crime concentration?
A) Mixed-use areas with pedestrian flow
B) Commercial districts with regulated lighting
C) High-crime clusters near abandoned structures
D) Residential zones with active barangay patrols
  • 80. A facility’s main entrance is exposed to direct vehicle access from a public road. Which security concept should be analyzed to mitigate vehicle-borne threats?
A) Employee comfort spaces
B) Blast stand-off distance
C) Perimeter painting
D) Interior signage
  • 81. Which architectural element provides both deterrence and detection when evaluating layered security?
A) Decorative fences
B) Carpeted hallways
C) Motion-activated lighting
D) Plain glass windows
  • 82. When analyzing pathways in urban design, which condition most increases risk according to CPTED?
A) Narrow alleys with poor lighting
B) Walkways monitored by CCTV
C) Pathways near visible public spaces
D) Open parks with community presence
  • 83. A security planner is assessing how building orientation affects nighttime risks. Which factor is most critical?
A) Window size
B) Light distribution and shadow analysis
C) Wall color
D) Rooftop slope
  • 84. In physical security analysis, what does the presence of multiple unlocked access doors indicate?
A) Enhanced visitor experience
B) High community engagement
C) Poor access management
D) Strong perimeter control
  • 85. Which urban planning factor most affects emergency response time analysis?
A) Public decorations
B) Road network connectivity
C) Sidewalk artistry
D) Billboard placement
  • 86. Analyzing the effectiveness of bollards in a building’s perimeter relates to which security function?
A) C Information security
B) Natural surveillance
C) Soft landscaping
D) Access control
  • 87. When assessing a security zone plan, which area is most vulnerable if mixed with unrestricted public space?
A) Outdoor recreation area
B) Parking façade
C) Reception lobby
D) Core administrative area
  • 88. A facility uses high walls but lacks surveillance. What analysis best explains this weakness?
A) Walls without monitoring create blind spots
B) Walls encourage community bonding
C) Walls improve natural lighting
D) High barriers eliminate all threats
  • 89. In analyzing building materials for security, laminated glass is preferred because it:
A) Breaks easily for ventilation
B) Provides resistance to forced entry
C) Fades sunlight exposure
D) Reduces electricity consumption
  • 90. When analyzing urban crime patterns, which environmental factor often correlates with increased vandalism?
A) High-visibility parks
B) Areas with community events
C) Areas with poor maintenance ("broken windows")
D) Active commercial zones
  • 91. If a facility has excellent CCTV but poor lighting, what can be concluded?
A) CCTV makes lighting unnecessary
B) CCTV automatically brightens footage
C) CCTV becomes ineffective due to darkness
D) CCTV compensates fully for lighting
  • 92. A building entrance facing a blind corner increases risk because it reduces:
A) Visibility for approaching threats
B) Structural stability
C) Employee comfort
D) Interior temperature
  • 93. Analyzing pedestrian traffic flow is essential in security planning because it:
A) Helps determine paint colors
B) Identifies crowding that may mask hostile intent
C) Improves interior aesthetics
D) Reduces real estate value
  • 94. In physical security evaluation, which combination increases intrusion risk?
A) Hidden entrances + poor lighting
B) Glass doors + reinforced locks
C) D CCTVs + guard patrols
D) High walls + intrusion alarms
  • 95. Which urban design flaw most contributes to crime displacement analysis?
A) Hidden escape routes in informal settlements
B) Overly wide roads
C) Pedestrian-friendly walkways
D) Well-planned zoning
  • 96. The absence of a defined perimeter in architectural design makes it most difficult to analyze:
A) Furniture placement
B) Visitor screening points
C) Employee morale
D) Window design
  • 97. When analyzing physical barriers, which factor most determines their effectiveness?
A) Ability to blend with landscape
B) Aesthetic quality
C) Height, strength, and placement
D) Color scheme
  • 98. A poorly lit parking area is high-risk primarily because it reduces:
A) Employee punctuality
B) Natural surveillance opportunities
C) Landscaping efficiency
D) Economic viability
  • 99. What can be inferred when pedestrian walkways intersect with high-speed traffic lanes?
A) Increased social interaction
B) High environmental safety
C) Elevated hazard and accident risk
D) Improved traffic efficiency
  • 100. If a building uses reflective surfaces at entrances, analysis shows it enhances security by improving:
A) Decorative appeal
B) Noise reduction
C) Visibility of approaching individuals
D) Temperature control
Created with That Quiz — the site for test creation and grading in math and other subjects.