A) Security Guard Regulation Act B) Private Security Services Industry Act C) Private Detective Act D) Private Security Agencies Act
A) License to Officiate B) License to Operate C) License to Organize D) License to Observe
A) License to Enlist Security Personnel B) License to Exercise Security Profession C) License to Employ Security Professionals D) License to Establish Security Profession
A) RA 5487 B) RA 7031 C) RA 9184 D) RA 10591
A) Chief of the Philippine National Police (PNP) or authorized representative B) Department of Labor and Employment (DOLE) C) Department of Justice D) Department of Interior and Local Government (DILG)
A) Only K9-unit handlers B) Any government police force C) Only persons providing alarm system monitoring D) Any person or juridical entity that recruits/security guards for hire
A) Must own a security agency B) Must undergo pre-licensing training program C) Must be at least 30 years old D) None — license is automatic
A) 2 years B) 5 years C) 4 years D) 3 years
A) 10% B) 20% C) 25% D) 15%
A) No, juridical entities are excluded B) No, only individuals can apply C) Yes, if wholly Filipino-owned and controlled D) Yes, but only foreign-owned ones
A) CCTV hardware suppliers and operations B) Private detective agencies C) Security training agencies D) Government police patrol units
A) False B) True
A) Operating without firearms B) Charging administrative fee of 20% C) Using force to influence elections D) Hiring only Filipino citizens
A) D.Training only for K9 handlers B) No training required C) Pre-Licensing Training Programs D) On-the-job training only
A) Government investigators on B) Only members of the Armed Forces of the Philippines C) Persons issued a valid LESP after satisfying requirements D) Any person who works as a guard without license
A) Private investigators and K9 handlers B) Security guards and watchmen C) All of the above D) Security consultants and system designers
A) A bond issued by an accredited surety or insurance company B) Proof of previous experience only C) Nothing — just a form D) A security deposit with the client
A) To strengthen regulation and establish quality standards for private security services B) D To nationalize all private security agencies C) To limit the role of private security to non-critical establishments only D) To deregulate private security industry
A) Yes — there is no limit B) Yes — but only if foreign-owned C) No — limit is 2,000 D) No — limit is 1,000
A) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act) B) RA 7721 (1989 Polaris Law) C) RA 6713 (Code of Conduct and Ethical Standards) D) RA 9165 (Comprehensive Dangerous Drugs Act)
A) None of the above B) Security Officers Training Course C) Both A and B D) Basic Security Guard Course
A) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA B) Any school — public or private — regardless of accreditation C) Foreign training institutions only D) Only the PNP itself
A) True B) False
A) Automatic cancellation without fine B) Must reapply in 1 year only C) Fine between ₱50,000 and ₱100,000 D) No penalty
A) Exempt from training requirements B) Allowed to perform law enforcement duties with full police powers C) Equipped with firearms only D) Competent and able to complement law enforcement authorities in maintaining peace and order
A) Continue the inspection silently B) Refer the customer to HR C) Explain the policy politely and perform the inspection professionally D) Ignore the complaint
A) Tell other guards verbally only B) Ignore it unless a crime happens C) Report to your supervisor and document the behavior D) Confront him aggressively
A) Lock the doors B) Panic and run C) Call the media D) Activate the alarm and assist evacuation
A) Argue with the visitor B) Ignore protocol for VIPs C) Deny entry following access control procedure D) Let them enter since they look trustworthy
A) Approach immediately without backup B) Turn off the CCTV C) Record the incident and notify the security manager D) Post the footage online
A) Check bags without permission B) Avoid eye contac C) Greet customers and explain procedures briefly D) Perform checks silently
A) Establish a perimeter and report it B) Move it to the office C) Open it immediately D) Kick it to check for noise
A) Immediately deactivate the card and issue a temporary one B) Ignore the report C) Allow entry without identification D) Tell them to search again
A) Accuse the suspect instantly B) Destroy old footage C) Avoid writing a report D) Gather evidence, review CCTV, and interview witnesses
A) Shout to maintain order B) Manage lines and communicate delays politely C) Close the entrance D) Allow skipping procedures
A) Allow skipping procedures B) Shout to maintain order C) Close the entrance D) Manage lines and communicate delays politely
A) Cancel all work B) Lock the building permanently C) Ignore the intelligence D) Strengthen perimeter checks and brief the team
A) Walk away B) Tell them it’s not your job C) Assist them courteously D) Point them in the wrong direction
A) Ignore it B) Record it for personal use C) Join them D) Report and correct the violation professionally
A) Verify documents and confirm with the office B) Let them unload freely C) Allow entry immediately D) Ignore standard procedure
A) Document all handlers of evidence clearly B) Pass evidence to anyone available C) Leave evidence unsecured D) Let witnesses hold the item
A) Report and record the malfunction immediately B) Remove the camera yourself C) Ignore the issue D) Cover it
A) Ask for autographs B) Provide guided access within protocol C) Let them pass unscreened D) Skip screening
A) Guide movements and maintain clear communication B) Allow overcrowding C) Use force immediately D) Block all exits
A) Spread the information immediately B) Ignore all intel C) Assume it’s false D) Analyze, verify, and confirm through reliable sources
A) Maintain calm and de-escalate the situation B) Shout at them C) Argue back D) Use force immediately
A) Panic B) Crowd around the victim C) Call medical assistance and perform basic first aid D) Move the victim without assessment
A) Provide the information B) Ignore it C) Politely decline and report the inquiry D) Give false details
A) Throw them in open bins B) Give copies to all employees C) Use secure storage and control access D) Leave documents on your desk
A) Ignore it B) Hang up immediately C) Keep the caller talking, record details, and notify authorities D) Post the threat online
A) Add personal opinions B) Document facts clearly, chronologically, and objectively C) Delay the report for days D) Submit reports without details
A) Interview checklist B) CCTV placement map C) Risk impact matrix D) Organizational chart
A) Issuing ID badges B) Installing lighting and surveillance C) Posting emergency hotlines D) Conducting background checks
A) Providing annual training B) Hiring only referrals C) Conducting random integrity testing D) Issuing visitor passes
A) Locking cabinets and applying access logs B) Filing documents alphabetically C) Allowing unlimited photocopying D) Placing all documents in open shelves
A) Allow all employees to bring any USB B) Require encrypted USB devices and scanning C) Disable all USB ports permanently D) Encourage file transfers via social media
A) Preparing the annual budget B) Listing all possible internal and external threats C) Evaluating insurance policies D) Drafting job descriptions
A) Duty roster B) Security guard post order C) Risk probability-impact matrix D) Organizational mission-vision
A) Enhancing office décor B) Allowing visitors to roam freely C) Implementing biometric access control D) Open-door policy for transparency
A) Tree planting B) Adequate lighting and patrols C) Directional signs only D) Offering valet parking
A) Posting "Do Not Enter" signs B) Permanently locking all exits C) Removing all emergency exit doors D) Installing exit alarms and panic bars
A) Allowing interns unrestricted access B) Keeping confidential files in fire-resistant safes C) Using color coding for case folders D) Displaying documents on bulletin boards
A) Updating organizational charts B) Conducting team building C) Closing all branches temporarily D) Relocating operations to an alternate site
A) Install turnstiles with access control B) Provide umbrellas for visitors C) Add more posters on policies D) Remove all physical barriers
A) Budget allocation B) Risk assessment and analysis C) Monitoring guards' attendance D) Risk avoidance
A) Sending drafts to social media inboxes B) Removing passwords C) Applying encryption and multi-factor authentication D) Using unverified public Wi-Fi
A) Salary increase program B) Evacuation and response drills C) Flexible work hours D) General orientation lectures
A) Listening to employee complaints B) Performing penetration testing C) Reviewing financial reports D) Rearranging inventory
A) Give them master keys B) Trust referrals without checks C) Issue limited access IDs and monitor activities D) Allow them full system access
A) No markings to avoid suspicion B) “Confidential,” “Secret,” and “Restricted” stamps C) Color-blind friendly icons D) Decorative labels
A) VPN and secure company devices B) Any software they prefer C) Open public Wi-Fi D) Personal email accounts
A) Reducing guard deployment B) Enhancing barriers, lighting, and patrols C) Eliminating CCTV monitoring D) Increasing the number of blind spots
A) Removing antivirus software B) Playing music during work C) Implementing daily data backups D) Cmm Giving more breaks
A) Asking only senior guards for input B) Ignoring irregularities found C) Reviewing guard logs and observing actual posts D) Looking only at CCTV footage
A) Remove barriers to ensure smooth flow B) Rely solely on CCTV C) Establish access control points and metal detectors D) Allow guests to enter without screening
A) Lay off all employees B) Cancel all IT support C) Lock all offices without notice D) Create a work-from-home and rotation plan
A) Natural Surveillance B) Access Control C) Territorial Reinforcement D) Maintenance
A) Multiple concealed corridors B) High interior walls C) Clearly marked exit routes D) Decorative landscaping
A) High-crime clusters near abandoned structures B) Residential zones with active barangay patrols C) Commercial districts with regulated lighting D) Mixed-use areas with pedestrian flow
A) Employee comfort spaces B) Perimeter painting C) Interior signage D) Blast stand-off distance
A) Carpeted hallways B) Decorative fences C) Motion-activated lighting D) Plain glass windows
A) Open parks with community presence B) Narrow alleys with poor lighting C) Walkways monitored by CCTV D) Pathways near visible public spaces
A) Light distribution and shadow analysis B) Window size C) Wall color D) Rooftop slope
A) Enhanced visitor experience B) Strong perimeter control C) High community engagement D) Poor access management
A) Public decorations B) Billboard placement C) Sidewalk artistry D) Road network connectivity
A) Soft landscaping B) Access control C) C Information security D) Natural surveillance
A) Outdoor recreation area B) Core administrative area C) Parking façade D) Reception lobby
A) Walls without monitoring create blind spots B) Walls encourage community bonding C) High barriers eliminate all threats D) Walls improve natural lighting
A) Reduces electricity consumption B) Provides resistance to forced entry C) Fades sunlight exposure D) Breaks easily for ventilation
A) High-visibility parks B) Active commercial zones C) Areas with community events D) Areas with poor maintenance ("broken windows")
A) CCTV becomes ineffective due to darkness B) CCTV makes lighting unnecessary C) CCTV compensates fully for lighting D) CCTV automatically brightens footage
A) Employee comfort B) Visibility for approaching threats C) Structural stability D) Interior temperature
A) Improves interior aesthetics B) Identifies crowding that may mask hostile intent C) Reduces real estate value D) Helps determine paint colors
A) Glass doors + reinforced locks B) D CCTVs + guard patrols C) Hidden entrances + poor lighting D) High walls + intrusion alarms
A) Overly wide roads B) Well-planned zoning C) Hidden escape routes in informal settlements D) Pedestrian-friendly walkways
A) Visitor screening points B) Window design C) Furniture placement D) Employee morale
A) Color scheme B) Height, strength, and placement C) Ability to blend with landscape D) Aesthetic quality
A) Landscaping efficiency B) Employee punctuality C) Economic viability D) Natural surveillance opportunities
A) Increased social interaction B) High environmental safety C) Improved traffic efficiency D) Elevated hazard and accident risk
A) Noise reduction B) Decorative appeal C) Temperature control D) Visibility of approaching individuals |