A) Private Security Agencies Act B) Private Detective Act C) Security Guard Regulation Act D) Private Security Services Industry Act
A) License to Operate B) License to Officiate C) License to Observe D) License to Organize
A) License to Exercise Security Profession B) License to Establish Security Profession C) License to Employ Security Professionals D) License to Enlist Security Personnel
A) RA 10591 B) RA 5487 C) RA 7031 D) RA 9184
A) Department of Labor and Employment (DOLE) B) Chief of the Philippine National Police (PNP) or authorized representative C) Department of Justice D) Department of Interior and Local Government (DILG)
A) Any government police force B) Any person or juridical entity that recruits/security guards for hire C) Only persons providing alarm system monitoring D) Only K9-unit handlers
A) None — license is automatic B) Must own a security agency C) Must be at least 30 years old D) Must undergo pre-licensing training program
A) 3 years B) 4 years C) 5 years D) 2 years
A) 25% B) 20% C) 10% D) 15%
A) Yes, if wholly Filipino-owned and controlled B) Yes, but only foreign-owned ones C) No, juridical entities are excluded D) No, only individuals can apply
A) Security training agencies B) Private detective agencies C) CCTV hardware suppliers and operations D) Government police patrol units
A) False B) True
A) Charging administrative fee of 20% B) Hiring only Filipino citizens C) Operating without firearms D) Using force to influence elections
A) No training required B) D.Training only for K9 handlers C) Pre-Licensing Training Programs D) On-the-job training only
A) Any person who works as a guard without license B) Only members of the Armed Forces of the Philippines C) Government investigators on D) Persons issued a valid LESP after satisfying requirements
A) Security consultants and system designers B) Private investigators and K9 handlers C) Security guards and watchmen D) All of the above
A) Nothing — just a form B) A security deposit with the client C) A bond issued by an accredited surety or insurance company D) Proof of previous experience only
A) To limit the role of private security to non-critical establishments only B) To deregulate private security industry C) D To nationalize all private security agencies D) To strengthen regulation and establish quality standards for private security services
A) Yes — there is no limit B) Yes — but only if foreign-owned C) No — limit is 2,000 D) No — limit is 1,000
A) RA 7721 (1989 Polaris Law) B) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act) C) RA 6713 (Code of Conduct and Ethical Standards) D) RA 9165 (Comprehensive Dangerous Drugs Act)
A) Security Officers Training Course B) Basic Security Guard Course C) Both A and B D) None of the above
A) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA B) Any school — public or private — regardless of accreditation C) Only the PNP itself D) Foreign training institutions only
A) True B) False
A) Must reapply in 1 year only B) Fine between ₱50,000 and ₱100,000 C) No penalty D) Automatic cancellation without fine
A) Competent and able to complement law enforcement authorities in maintaining peace and order B) Allowed to perform law enforcement duties with full police powers C) Equipped with firearms only D) Exempt from training requirements
A) Continue the inspection silently B) Explain the policy politely and perform the inspection professionally C) Ignore the complaint D) Refer the customer to HR
A) Ignore it unless a crime happens B) Confront him aggressively C) Report to your supervisor and document the behavior D) Tell other guards verbally only
A) Call the media B) Lock the doors C) Panic and run D) Activate the alarm and assist evacuation
A) Argue with the visitor B) Ignore protocol for VIPs C) Deny entry following access control procedure D) Let them enter since they look trustworthy
A) Approach immediately without backup B) Turn off the CCTV C) Post the footage online D) Record the incident and notify the security manager
A) Check bags without permission B) Avoid eye contac C) Perform checks silently D) Greet customers and explain procedures briefly
A) Kick it to check for noise B) Move it to the office C) Open it immediately D) Establish a perimeter and report it
A) Allow entry without identification B) Ignore the report C) Tell them to search again D) Immediately deactivate the card and issue a temporary one
A) Destroy old footage B) Avoid writing a report C) Gather evidence, review CCTV, and interview witnesses D) Accuse the suspect instantly
A) Shout to maintain order B) Close the entrance C) Allow skipping procedures D) Manage lines and communicate delays politely
A) Manage lines and communicate delays politely B) Close the entrance C) Allow skipping procedures D) Shout to maintain order
A) Strengthen perimeter checks and brief the team B) Cancel all work C) Ignore the intelligence D) Lock the building permanently
A) Walk away B) Assist them courteously C) Point them in the wrong direction D) Tell them it’s not your job
A) Report and correct the violation professionally B) Record it for personal use C) Join them D) Ignore it
A) Verify documents and confirm with the office B) Allow entry immediately C) Ignore standard procedure D) Let them unload freely
A) Document all handlers of evidence clearly B) Pass evidence to anyone available C) Leave evidence unsecured D) Let witnesses hold the item
A) Report and record the malfunction immediately B) Remove the camera yourself C) Cover it D) Ignore the issue
A) Skip screening B) Ask for autographs C) Provide guided access within protocol D) Let them pass unscreened
A) Block all exits B) Guide movements and maintain clear communication C) Allow overcrowding D) Use force immediately
A) Assume it’s false B) Ignore all intel C) Spread the information immediately D) Analyze, verify, and confirm through reliable sources
A) Shout at them B) Use force immediately C) Argue back D) Maintain calm and de-escalate the situation
A) Panic B) Crowd around the victim C) Call medical assistance and perform basic first aid D) Move the victim without assessment
A) Give false details B) Provide the information C) Politely decline and report the inquiry D) Ignore it
A) Give copies to all employees B) Use secure storage and control access C) Throw them in open bins D) Leave documents on your desk
A) Keep the caller talking, record details, and notify authorities B) Post the threat online C) Hang up immediately D) Ignore it
A) Document facts clearly, chronologically, and objectively B) Delay the report for days C) Add personal opinions D) Submit reports without details
A) Interview checklist B) CCTV placement map C) Organizational chart D) Risk impact matrix
A) Conducting background checks B) Issuing ID badges C) Installing lighting and surveillance D) Posting emergency hotlines
A) Hiring only referrals B) Providing annual training C) Conducting random integrity testing D) Issuing visitor passes
A) Locking cabinets and applying access logs B) Placing all documents in open shelves C) Filing documents alphabetically D) Allowing unlimited photocopying
A) Encourage file transfers via social media B) Allow all employees to bring any USB C) Disable all USB ports permanently D) Require encrypted USB devices and scanning
A) Evaluating insurance policies B) Preparing the annual budget C) Listing all possible internal and external threats D) Drafting job descriptions
A) Organizational mission-vision B) Risk probability-impact matrix C) Duty roster D) Security guard post order
A) Open-door policy for transparency B) Allowing visitors to roam freely C) Implementing biometric access control D) Enhancing office décor
A) Tree planting B) Adequate lighting and patrols C) Offering valet parking D) Directional signs only
A) Installing exit alarms and panic bars B) Posting "Do Not Enter" signs C) Removing all emergency exit doors D) Permanently locking all exits
A) Displaying documents on bulletin boards B) Keeping confidential files in fire-resistant safes C) Allowing interns unrestricted access D) Using color coding for case folders
A) Conducting team building B) Relocating operations to an alternate site C) Closing all branches temporarily D) Updating organizational charts
A) Add more posters on policies B) Remove all physical barriers C) Provide umbrellas for visitors D) Install turnstiles with access control
A) Budget allocation B) Risk assessment and analysis C) Monitoring guards' attendance D) Risk avoidance
A) Applying encryption and multi-factor authentication B) Sending drafts to social media inboxes C) Removing passwords D) Using unverified public Wi-Fi
A) Flexible work hours B) Salary increase program C) General orientation lectures D) Evacuation and response drills
A) Performing penetration testing B) Rearranging inventory C) Listening to employee complaints D) Reviewing financial reports
A) Give them master keys B) Allow them full system access C) Issue limited access IDs and monitor activities D) Trust referrals without checks
A) “Confidential,” “Secret,” and “Restricted” stamps B) No markings to avoid suspicion C) Color-blind friendly icons D) Decorative labels
A) VPN and secure company devices B) Open public Wi-Fi C) Personal email accounts D) Any software they prefer
A) Reducing guard deployment B) Eliminating CCTV monitoring C) Increasing the number of blind spots D) Enhancing barriers, lighting, and patrols
A) Cmm Giving more breaks B) Removing antivirus software C) Implementing daily data backups D) Playing music during work
A) Ignoring irregularities found B) Reviewing guard logs and observing actual posts C) Looking only at CCTV footage D) Asking only senior guards for input
A) Remove barriers to ensure smooth flow B) Rely solely on CCTV C) Establish access control points and metal detectors D) Allow guests to enter without screening
A) Cancel all IT support B) Lay off all employees C) Lock all offices without notice D) Create a work-from-home and rotation plan
A) Access Control B) Natural Surveillance C) Territorial Reinforcement D) Maintenance
A) High interior walls B) Clearly marked exit routes C) Decorative landscaping D) Multiple concealed corridors
A) Residential zones with active barangay patrols B) Commercial districts with regulated lighting C) Mixed-use areas with pedestrian flow D) High-crime clusters near abandoned structures
A) Employee comfort spaces B) Blast stand-off distance C) Interior signage D) Perimeter painting
A) Plain glass windows B) Carpeted hallways C) Decorative fences D) Motion-activated lighting
A) Pathways near visible public spaces B) Open parks with community presence C) Narrow alleys with poor lighting D) Walkways monitored by CCTV
A) Window size B) Light distribution and shadow analysis C) Wall color D) Rooftop slope
A) Strong perimeter control B) Poor access management C) Enhanced visitor experience D) High community engagement
A) Road network connectivity B) Billboard placement C) Public decorations D) Sidewalk artistry
A) Soft landscaping B) C Information security C) Access control D) Natural surveillance
A) Reception lobby B) Outdoor recreation area C) Parking façade D) Core administrative area
A) High barriers eliminate all threats B) Walls without monitoring create blind spots C) Walls encourage community bonding D) Walls improve natural lighting
A) Provides resistance to forced entry B) Fades sunlight exposure C) Breaks easily for ventilation D) Reduces electricity consumption
A) Active commercial zones B) Areas with poor maintenance ("broken windows") C) High-visibility parks D) Areas with community events
A) CCTV becomes ineffective due to darkness B) CCTV makes lighting unnecessary C) CCTV automatically brightens footage D) CCTV compensates fully for lighting
A) Visibility for approaching threats B) Interior temperature C) Structural stability D) Employee comfort
A) Reduces real estate value B) Improves interior aesthetics C) Identifies crowding that may mask hostile intent D) Helps determine paint colors
A) D CCTVs + guard patrols B) High walls + intrusion alarms C) Glass doors + reinforced locks D) Hidden entrances + poor lighting
A) Hidden escape routes in informal settlements B) Overly wide roads C) Pedestrian-friendly walkways D) Well-planned zoning
A) Window design B) Visitor screening points C) Furniture placement D) Employee morale
A) Color scheme B) Height, strength, and placement C) Aesthetic quality D) Ability to blend with landscape
A) Employee punctuality B) Natural surveillance opportunities C) Economic viability D) Landscaping efficiency
A) Increased social interaction B) Improved traffic efficiency C) Elevated hazard and accident risk D) High environmental safety
A) Noise reduction B) Visibility of approaching individuals C) Temperature control D) Decorative appeal |