LEA3-ISAMANA
  • 1. What is the short title of RA 11917?
A) Security Guard Regulation Act
B) Private Detective Act
C) Private Security Services Industry Act
D) Private Security Agencies Act
  • 2. What does the acronym “LTO” stand for in RA 11917?
A) License to Operate
B) License to Organize
C) License to Observe
D) License to Officiate
  • 3. What does “LESP” refer to under RA 11917?
A) License to Establish Security Profession
B) License to Employ Security Professionals
C) License to Enlist Security Personnel
D) License to Exercise Security Profession
  • 4. Which existing law is repealed by RA 11917?
A) RA 10591
B) RA 5487
C) RA 9184
D) RA 7031
  • 5. Who issues the LTO or LESP under RA 11917?
A) Chief of the Philippine National Police (PNP) or authorized representative
B) Department of Labor and Employment (DOLE)
C) Department of Interior and Local Government (DILG)
D) Department of Justice
  • 6. Which of the following is considered a “Private Security Agency (PSA)” under RA 11917?
A) Any government police force
B) Only K9-unit handlers
C) Only persons providing alarm system monitoring
D) Any person or juridical entity that recruits/security guards for hire
  • 7. What is required before a person can be granted a LESP?
A) None — license is automatic
B) Must be at least 30 years old
C) Must own a security agency
D) Must undergo pre-licensing training program
  • 8. How long is a valid LESP issued under RA 11917 (subject to renewal)?
A) 2 years
B) 5 years
C) 3 years
D) 4 years
  • 9. What is the minimum administrative fee that a PSA may charge its clients (as a percentage of contract cost)?
A) 10%
B) 25%
C) 20%
D) 15%
  • 10. Can a juridical entity (corporation) apply for a License to Operate (LTO) under RA 11917?
A) No, juridical entities are excluded
B) No, only individuals can apply
C) Yes, but only foreign-owned ones
D) Yes, if wholly Filipino-owned and controlled
  • 11. Which among the following is NOT part of the “Private Security Industry” as defined in RA 11917?
A) Private detective agencies
B) CCTV hardware suppliers and operations
C) Security training agencies
D) Government police patrol units
  • 12. True or False: A PSA may remain valid indefinitely once it obtains an LTO.
A) True
B) False
  • 13. Which of the following is a ground for cancellation or suspension of a PSA’s license under RA 11917?
A) Using force to influence elections
B) Hiring only Filipino citizens
C) Operating without firearms
D) Charging administrative fee of 20%
  • 14. What kind of training programs does RA 11917 require before practice?
A) On-the-job training only
B) No training required
C) D.Training only for K9 handlers
D) Pre-Licensing Training Programs
  • 15. Under RA 11917, who qualifies as a “Private Security Professional (PSP)”?
A) Any person who works as a guard without license
B) Persons issued a valid LESP after satisfying requirements
C) Only members of the Armed Forces of the Philippines
D) Government investigators on
  • 16. Which of the following is included among the possible roles under PSP as defined by RA 11917?
A) All of the above
B) Security guards and watchmen
C) Security consultants and system designers
D) Private investigators and K9 handlers
  • 17. What must accompany an application for LTO under RA 11917?
A) Nothing — just a form
B) A security deposit with the client
C) Proof of previous experience only
D) A bond issued by an accredited surety or insurance company
  • 18. Which of the following is a declared policy of the State under RA 11917?
A) To deregulate private security industry
B) To limit the role of private security to non-critical establishments only
C) To strengthen regulation and establish quality standards for private security services
D) D To nationalize all private security agencies
  • 19. Can a private security agency deploy more than 2,000 security professionals under RA 11917?
A) No — limit is 1,000
B) Yes — there is no limit
C) No — limit is 2,000
D) Yes — but only if foreign-owned
  • 20. Which law does RA 11917 reference when allowing issuance of firearms to PSAs under certain conditions?
A) RA 7721 (1989 Polaris Law)
B) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act)
C) RA 6713 (Code of Conduct and Ethical Standards)
D) RA 9165 (Comprehensive Dangerous Drugs Act)
  • 21. Pre-licensing training under RA 11917 may include which of the following courses?
A) Both A and B
B) None of the above
C) Security Officers Training Course
D) Basic Security Guard Course
  • 22. Who among the following may be granted LTO for a Private Security Training Agency (PSTA)?
A) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA
B) Any school — public or private — regardless of accreditation
C) Foreign training institutions only
D) Only the PNP itself
  • 23. True or False: Under RA 11917, a person who renders private security services without a valid LESP may be penalized.
A) False
B) True
  • 24. What happens if a PSA operates with an expired LTO under RA 11917?
A) Automatic cancellation without fine
B) No penalty
C) Must reapply in 1 year only
D) Fine between ₱50,000 and ₱100,000
  • 25. The purpose of RA 11917 includes ensuring that private security personnel are?
A) Allowed to perform law enforcement duties with full police powers
B) Exempt from training requirements
C) Competent and able to complement law enforcement authorities in maintaining peace and order
D) Equipped with firearms only
  • 26. A customer complains about a bag inspection at the gate. As a security officer, what is the most appropriate action to apply customer-relations skills?
A) Continue the inspection silently
B) Explain the policy politely and perform the inspection professionally
C) Refer the customer to HR
D) Ignore the complaint
  • 27. You receive information about a suspicious individual frequently surveying the perimeter. What is your best immediate application of security protocol?
A) Tell other guards verbally only
B) Confront him aggressively
C) Ignore it unless a crime happens
D) Report to your supervisor and document the behavior
  • 28. A fire breaks out in a storage room. What should the security officer apply first?
A) Activate the alarm and assist evacuation
B) Call the media
C) Panic and run
D) Lock the doors
  • 29. A visitor refuses to sign the logbook. What should you apply to handle the situation?
A) Deny entry following access control procedure
B) Argue with the visitor
C) Let them enter since they look trustworthy
D) Ignore protocol for VIPs
  • 30. While on CCTV monitoring, you observe an employee frequently accessing restricted areas. What is your best action?
A) Turn off the CCTV
B) Approach immediately without backup
C) Record the incident and notify the security manager
D) Post the footage online
  • 31. To apply customer service skills during security checks, what should you do?
A) Check bags without permission
B) Perform checks silently
C) Greet customers and explain procedures briefly
D) Avoid eye contac
  • 32. You find a suspicious unattended bag in the lobby. What protocol should you apply?
A) Kick it to check for noise
B) Move it to the office
C) Open it immediately
D) Establish a perimeter and report it
  • 33. An employee reports a lost access card. What should you apply?
A) Tell them to search again
B) Immediately deactivate the card and issue a temporary one
C) Allow entry without identification
D) Ignore the report
  • 34. You are investigating a theft. What is the best application of corporate investigation skills?
A) Destroy old footage
B) Accuse the suspect instantly
C) Gather evidence, review CCTV, and interview witnesses
D) Avoid writing a report
  • 35. During peak hours, people become impatient at security queues. What should you apply?
A) Shout to maintain order
B) Close the entrance
C) Manage lines and communicate delays politely
D) Allow skipping procedures
  • 36. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Manage lines and communicate delays politely
B) Close the entrance
C) Allow skipping procedures
D) Shout to maintain order
  • 37. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Lock the building permanently
B) Strengthen perimeter checks and brief the team
C) Ignore the intelligence
D) Cancel all work
  • 38. While patrolling, a customer asks for directions. What customer-relations skill do you apply?
A) Assist them courteously
B) Walk away
C) Tell them it’s not your job
D) Point them in the wrong direction
  • 39. A co-worker is violating safety rules. What should you apply?
A) Record it for personal use
B) Report and correct the violation professionally
C) Ignore it
D) Join them
  • 40. A delivery truck arrives without prior notice. What protocol should you apply?
A) Ignore standard procedure
B) Let them unload freely
C) Verify documents and confirm with the office
D) Allow entry immediately
  • 41. During an investigation, you must ensure chain of custody. How do you apply this?
A) Leave evidence unsecured
B) Let witnesses hold the item
C) Document all handlers of evidence clearly
D) Pass evidence to anyone available
  • 42. You notice a CCTV camera malfunctioning. What should you apply?
A) Remove the camera yourself
B) Ignore the issue
C) Cover it
D) Report and record the malfunction immediately
  • 43. A VIP arrives at the premises. What should you do to apply security and customer service?
A) Ask for autographs
B) Provide guided access within protocol
C) Let them pass unscreened
D) Skip screening
  • 44. You are assigned to crowd control during an event. What should you apply?
A) Use force immediately
B) Guide movements and maintain clear communication
C) Allow overcrowding
D) Block all exits
  • 45. A colleague provides unverified information about a potential threat. What is the correct application of intelligence validation?
A) Spread the information immediately
B) Ignore all intel
C) Assume it’s false
D) Analyze, verify, and confirm through reliable sources
  • 46. A customer becomes verbally aggressive. What should you apply?
A) Argue back
B) Use force immediately
C) Maintain calm and de-escalate the situation
D) Shout at them
  • 47. During a medical emergency, what should you apply first?
A) Call medical assistance and perform basic first aid
B) Crowd around the victim
C) Panic
D) Move the victim without assessment
  • 48. A suspicious person asks questions about shift schedules. What should you apply?
A) Ignore it
B) Provide the information
C) Give false details
D) Politely decline and report the inquiry
  • 49. You are tasked to secure sensitive corporate documents. What should you apply?
A) Throw them in open bins
B) Give copies to all employees
C) Use secure storage and control access
D) Leave documents on your desk
  • 50. The building receives a bomb threat via phone. What should you apply?
A) Post the threat online
B) Keep the caller talking, record details, and notify authorities
C) Hang up immediately
D) Ignore it
  • 51. You are to apply proper incident reporting. What should you do?
A) Add personal opinions
B) Submit reports without details
C) Document facts clearly, chronologically, and objectively
D) Delay the report for days
  • 52. During a security survey, you are tasked to verify blind spots in a warehouse. Which tool should you apply to best identify these vulnerable areas?
A) CCTV placement map
B) Risk impact matrix
C) Organizational chart
D) Interview checklist
  • 53. To apply physical security principles, which measure should you implement first when securing a newly constructed perimeter fence?
A) Conducting background checks
B) Installing lighting and surveillance
C) Issuing ID badges
D) Posting emergency hotlines
  • 54. When creating a personnel security plan, which of the following actions best applies the principle of “trust but verify”?
A) Issuing visitor passes
B) Providing annual training
C) Hiring only referrals
D) Conducting random integrity testing
  • 55. A company wants to secure confidential files stored in cabinets. Which application of document security is MOST appropriate?
A) Allowing unlimited photocopying
B) Locking cabinets and applying access logs
C) Filing documents alphabetically
D) Placing all documents in open shelves
  • 56. To apply information security protocols in an office with frequent USB use, what should you implement?
A) Allow all employees to bring any USB
B) Disable all USB ports permanently
C) Encourage file transfers via social media
D) Require encrypted USB devices and scanning
  • 57. You are asked to conduct a threat assessment for a bank. Which step best applies risk identification?
A) Preparing the annual budget
B) Evaluating insurance policies
C) Drafting job descriptions
D) Listing all possible internal and external threats
  • 58. To determine which risks should be addressed first, which tool should be applied?
A) Organizational mission-vision
B) Risk probability-impact matrix
C) Duty roster
D) Security guard post order
  • 59. The HR office wants to limit unauthorized access. Which application of personnel security is MOST effective?
A) Allowing visitors to roam freely
B) Open-door policy for transparency
C) Implementing biometric access control
D) Enhancing office décor
  • 60. When applying physical security in parking areas, which measure provides the strongest deterrence?
A) Adequate lighting and patrols
B) Offering valet parking
C) Tree planting
D) Directional signs only
  • 61. During a security survey, you identify several unsecured emergency exits. What should you apply to correct the issue without violating safety codes?
A) Permanently locking all exits
B) Installing exit alarms and panic bars
C) Removing all emergency exit doors
D) Posting "Do Not Enter" signs
  • 62. What is the correct application of document security in a legal department?
A) Displaying documents on bulletin boards
B) Keeping confidential files in fire-resistant safes
C) Using color coding for case folders
D) Allowing interns unrestricted access
  • 63. When applying BCM, which action ensures critical operations continue after a fire?
A) Relocating operations to an alternate site
B) Updating organizational charts
C) Closing all branches temporarily
D) Conducting team building
  • 64. A company wants to prevent tailgating at entrances. Which measure should you apply?
A) Add more posters on policies
B) Provide umbrellas for visitors
C) Remove all physical barriers
D) Install turnstiles with access control
  • 65. In applying risk management, which step follows risk identification?
A) Risk assessment and analysis
B) Monitoring guards' attendance
C) Budget allocation
D) Risk avoidance
  • 66. Which is an applied method to protect information transmitted through email?
A) Removing passwords
B) Applying encryption and multi-factor authentication
C) Using unverified public Wi-Fi
D) Sending drafts to social media inboxes
  • 67. A security manager must ensure all staff understand emergency roles. Which BCM component should be applied?
A) General orientation lectures
B) Evacuation and response drills
C) Flexible work hours
D) Salary increase program
  • 68. When conducting a security survey of a storage facility, what applied method determines the effectiveness of locks?
A) Reviewing financial reports
B) Performing penetration testing
C) Listening to employee complaints
D) Rearranging inventory
  • 69. Applying personnel security, how should temporary workers be managed
A) Trust referrals without checks
B) Give them master keys
C) Issue limited access IDs and monitor activities
D) Allow them full system access
  • 70. When applying document security for classified materials, which marking system should be used?
A) Decorative labels
B) No markings to avoid suspicion
C) Color-blind friendly icons
D) “Confidential,” “Secret,” and “Restricted” stamps
  • 71. To apply information security during remote work, what should employees use?
A) VPN and secure company devices
B) Personal email accounts
C) Any software they prefer
D) Open public Wi-Fi
  • 72. In risk management, which applied strategy reduces the likelihood of intrusion?
A) Eliminating CCTV monitoring
B) Enhancing barriers, lighting, and patrols
C) Reducing guard deployment
D) Increasing the number of blind spots
  • 73. Which BCM action ensures quick restoration of digital records after system failure?
A) Removing antivirus software
B) Implementing daily data backups
C) Playing music during work
D) Cmm Giving more breaks
  • 74. What is the correct application of a security survey to improve guard performance
A) Reviewing guard logs and observing actual posts
B) Ignoring irregularities found
C) Looking only at CCTV footage
D) Asking only senior guards for input
  • 75. To apply physical security for a VIP event, which measure is MOST appropriate?
A) Rely solely on CCTV
B) Remove barriers to ensure smooth flow
C) Allow guests to enter without screening
D) Establish access control points and metal detectors
  • 76. A company must ensure operations continue during a pandemic. Which BCM strategy should be applied?
A) Lay off all employees
B) Create a work-from-home and rotation plan
C) Cancel all IT support
D) Lock all offices without notice
  • 77. Which principle of Crime Prevention Through Environmental Design (CPTED) is best applied when analyzing how transparent store-front windows reduce concealment zones?
A) Natural Surveillance
B) Access Control
C) Territorial Reinforcement
D) Maintenance
  • 78. When evaluating a building layout, which design feature most effectively integrates architectural security with emergency egress analysis?
A) Decorative landscaping
B) High interior walls
C) Clearly marked exit routes
D) Multiple concealed corridors
  • 79. In analyzing urban planning risks, which pattern indicates ineffective zoning related to crime concentration?
A) Residential zones with active barangay patrols
B) Commercial districts with regulated lighting
C) Mixed-use areas with pedestrian flow
D) High-crime clusters near abandoned structures
  • 80. A facility’s main entrance is exposed to direct vehicle access from a public road. Which security concept should be analyzed to mitigate vehicle-borne threats?
A) Interior signage
B) Blast stand-off distance
C) Employee comfort spaces
D) Perimeter painting
  • 81. Which architectural element provides both deterrence and detection when evaluating layered security?
A) Plain glass windows
B) Decorative fences
C) Carpeted hallways
D) Motion-activated lighting
  • 82. When analyzing pathways in urban design, which condition most increases risk according to CPTED?
A) Walkways monitored by CCTV
B) Pathways near visible public spaces
C) Narrow alleys with poor lighting
D) Open parks with community presence
  • 83. A security planner is assessing how building orientation affects nighttime risks. Which factor is most critical?
A) Rooftop slope
B) Wall color
C) Window size
D) Light distribution and shadow analysis
  • 84. In physical security analysis, what does the presence of multiple unlocked access doors indicate?
A) Enhanced visitor experience
B) Strong perimeter control
C) High community engagement
D) Poor access management
  • 85. Which urban planning factor most affects emergency response time analysis?
A) Public decorations
B) Billboard placement
C) Sidewalk artistry
D) Road network connectivity
  • 86. Analyzing the effectiveness of bollards in a building’s perimeter relates to which security function?
A) C Information security
B) Natural surveillance
C) Access control
D) Soft landscaping
  • 87. When assessing a security zone plan, which area is most vulnerable if mixed with unrestricted public space?
A) Parking façade
B) Outdoor recreation area
C) Core administrative area
D) Reception lobby
  • 88. A facility uses high walls but lacks surveillance. What analysis best explains this weakness?
A) Walls improve natural lighting
B) Walls encourage community bonding
C) Walls without monitoring create blind spots
D) High barriers eliminate all threats
  • 89. In analyzing building materials for security, laminated glass is preferred because it:
A) Provides resistance to forced entry
B) Fades sunlight exposure
C) Breaks easily for ventilation
D) Reduces electricity consumption
  • 90. When analyzing urban crime patterns, which environmental factor often correlates with increased vandalism?
A) Areas with community events
B) Active commercial zones
C) High-visibility parks
D) Areas with poor maintenance ("broken windows")
  • 91. If a facility has excellent CCTV but poor lighting, what can be concluded?
A) CCTV automatically brightens footage
B) CCTV becomes ineffective due to darkness
C) CCTV makes lighting unnecessary
D) CCTV compensates fully for lighting
  • 92. A building entrance facing a blind corner increases risk because it reduces:
A) Visibility for approaching threats
B) Structural stability
C) Interior temperature
D) Employee comfort
  • 93. Analyzing pedestrian traffic flow is essential in security planning because it:
A) Helps determine paint colors
B) Reduces real estate value
C) Identifies crowding that may mask hostile intent
D) Improves interior aesthetics
  • 94. In physical security evaluation, which combination increases intrusion risk?
A) High walls + intrusion alarms
B) Hidden entrances + poor lighting
C) D CCTVs + guard patrols
D) Glass doors + reinforced locks
  • 95. Which urban design flaw most contributes to crime displacement analysis?
A) Hidden escape routes in informal settlements
B) Well-planned zoning
C) Overly wide roads
D) Pedestrian-friendly walkways
  • 96. The absence of a defined perimeter in architectural design makes it most difficult to analyze:
A) Visitor screening points
B) Window design
C) Furniture placement
D) Employee morale
  • 97. When analyzing physical barriers, which factor most determines their effectiveness?
A) Height, strength, and placement
B) Ability to blend with landscape
C) Color scheme
D) Aesthetic quality
  • 98. A poorly lit parking area is high-risk primarily because it reduces:
A) Natural surveillance opportunities
B) Landscaping efficiency
C) Economic viability
D) Employee punctuality
  • 99. What can be inferred when pedestrian walkways intersect with high-speed traffic lanes?
A) High environmental safety
B) Improved traffic efficiency
C) Increased social interaction
D) Elevated hazard and accident risk
  • 100. If a building uses reflective surfaces at entrances, analysis shows it enhances security by improving:
A) Decorative appeal
B) Visibility of approaching individuals
C) Noise reduction
D) Temperature control
Created with That Quiz — the site for test creation and grading in math and other subjects.