A) Counter SIGINT B) Weather observation C) Civil security D) Trade crafts
A) Non-military national B) Military personnel only C) Enemy combatants D) Weather conditions
A) Military operations only B) Specialized training programs C) Corollary and subsidiary guides D) Economic forecasts
A) Educational levels B) Population density C) Weather condition D) Enemy strength and disposition
A) Objectivity B) Security C) Communication D) Selection
A) It limits the scope of intelligence B) It remains the secrecy of files C) It ensure communication D) It allows for prediction of future events
A) Information about weather condition B) Enemy communication data C) Descriptive information for long-term use D) Immediate tactical life
A) Weather conditions B) Location of allies C) Enemy physical capabilities D) Communication patterns and Weakness
A) Collecting B) Processing C) Analysing D) Planning
A) Protecting against espionage subversion and sabotage B) Planning future operations C) Enhancing communication methods D) Destroying enemy infrastructure
A) Surveillance radar ang pattern analysis B) Civilian surveys C) Communication Intercepts D) Diplomatic relations
A) Creating new policies B) Destroying evidence C) Collating collected information D) Setting up defenses
A) Continuity B) Timeliness C) Interdependence D) Flexibility
A) Deduction B) Planning C) Collection D) Interpretation
A) Usefulness B) Objectivity C) Security D) Interdependence
A) Recording B) Analysis C) Collection D) Planning
A) Investigating small-scale crimes B) Training foreign diplomats C) Coordinating Intelligence for National Security D) Analyzing local community issues
A) Educational outreach programs B) Economic analysis C) Local crime Scene Investigation D) Maritime and aerial reconnaissance
A) Recording B) Deduction C) Collecting D) Processing
A) Training exercises B) Tactical Operations C) Policy making and decisions D) Collecting field data
A) Collecting weapons B) Setting up defenses C) Organizing training exercise D) Understanding the mission requirements
A) Analysis B) Collection C) Recording D) Integration
A) Data on individual personalities in power B) Information on public safety C) Knowledge of weather patterns D) Geographic location of enemy bases
A) Censorship B) Overt method C) Convert method D) Sabotage
A) Collection B) Interpretation C) Processing D) Planning
A) Sun Tzu B) Karl Schulmeister C) Hannibal of Rome D) Walsingham
A) It must remain in secret files B) It must focus only on domestic affairs C) It must be covert D) It should be told well and be convincing
A) Frederick the Great B) Delilah C) Karl Schulmeister D) Julius Caesar
A) Training new recrut B) Destroying hostile activities C) Gathering weather reports D) Tracking economic data
A) Military tactical information B) Information to prevent crimes and arrest offenders C) Knowledge about weather changes D) Education and public safety Information
A) "Knowledge is safety" B) "Security Above all" C) "Safety through Strength" D) "Knowledge is power"
A) Enemy identification B) Long-term forecasts and prediction C) Real-time data D) Immediate tactical updates
A) Sun Tzu B) Walsingham of England C) Major General Donovan D) Hannibal of Rome
A) Analyzing weather patterns B) Disguising to gain confidence of suspects C) Gathering geographical data D) Providing direct to officer
A) Sociological Intelligence B) Armed force Intelligence C) Geographical Intelligence D) Biographical Intelligence
A) Public opinion and demographics B) Economic development C) Armed forces movements D) Military manpower recruitment
A) Operational B) Contributory C) Collateral D) Estimative
A) Maintaining peace and order B) Weather Conditions C) Diplomatic Negotiations D) Tactical Military Operations
A) It should never charge B) It is only useful for military purposes C) It should always be speculative D) It should be communicated on time
A) Training personnel for covert operations B) Investigating violations of espionage laws C) Conducting Surveillance of Civilians D) Gathering weather data
A) Diplomatic relations B) Installations C) Weapons D) Finances
A) Human Intelligence B) Hazardous Intelligence C) High Utility Military Network D) Human Identification Network
A) Military personnel only B) Weather Conditions C) Enemy Combatants D) Non-military Nationals
A) Weather B) People C) Terrain D) Finance
A) Civil Security B) Military Security C) Port Frontier and Travel Security D) Special Operation
A) Weather analysis B) Preventing unauthorized access to sensitive data C) Offensive Operations D) Training field agents
A) End product from collecting, evaluating and analyzing information B) Collection of information on weather patterns C) Administrative tasks in government agencies D) Enforcement of laws and regulations
A) It is required by law B) It enhances training C) It is more profitable D) Late information is useless
A) Civil Security B) Censorship C) Military Security D) Counter Intelligence
A) Gathering information on criminal activities B) Studying the psychological aspects of people C) Researching economic and military potential D) Analyzing the organizational structure of the armed forces
A) Diplomatic Negotiations B) Preventing Cybercrimes C) Protection of lives and properties D) Military recruitment
A) Immediate Operational decision B) Training civilians C) International diplomacy D) Future policy formulation
A) Overt method B) Open communication C) Public surveys D) Trade crafts |