A) C. Compliance to service contract obligations B) B. Standardization of post duties C) D. Rotation of personnel D) A. Optimization of manpower
A) D. A manager limits guard functions to access control B) C. A manager focuses on surveillance only C) A. A manager assigns guards based on seniority D) B. A manager integrates security protocols with disaster preparedness plans
A) B. A mechanic adjusting tools for faster repair B) A. A doctor maintaining continuous medical education C) C. A clerk following old company rules D) D. A farmer changing planting schedules
A) A. Promoting security as mere enforcement B) B. Elevating security management to a recognized profession C) D. Encouraging more commercial licenses D) C. Restricting entry into the field of private protection
A) D. Participation in PNP-SOSIA certification B) C. Renewal of license without retraining C) B. Seminar on modern threat response D) A. Annual re-training of guards
A) A. Professional regulation and accountability B) C. Managerial discretion in deployment C) D. Training exemption clause D) B. Operational flexibility of agencies
A) B. Implementing continuing professional development and ethics training B) C. Outsourcing background checks C) A. Reducing the guard-to-client ratio D) D. Limiting the scope of internal audits
A) B. The Civil Code is to property B) D. The NBI Charter is to investigation C) C. The Penal Code is to punishment D) A. The Labor Code is to employment
A) C. It promotes efficient manpower use B) A. It violates regulatory competence standards C) B. It aligns with practical field operations D) D. It reduces administrative load
A) D. Decrease in security awareness training B) A. Reduced turnover due to higher wages C) C. Increase in unregistered security firms D) B. Consistent adherence to competency-based performance standards
A) A. Efficiency in operations B) B. Ethical accountability C) C. Institutional autonomy D) D. Corporate sustainability
A) C. Fiscal accountability B) D. Administrative discretion C) A. Delegation of authority D) B. Regulatory compliance in operational management
A) C. A private bank following BSP risk assessment B) D. A corporate lawyer bound by IBP ethics C) B. A barangay tanod acting as a police auxiliary D) A. A private nurse working under DOH regulation
A) C. The ratio of guards to clients B) D. The frequency of policy updates C) B. The consistency of security actions with ethical standards D) A. The number of personnel trained annually
A) B. Guards exercising discretion guided by legal standards B) D. Agencies avoiding government audits C) A. Security firms competing for higher pay rates D) C. Managers outsourcing training programs
A) b) To provide guidelines for professional conduct and integrity B) d) To promote competition among professionals C) c) To limit the number of professionals in a specific field D) a) To ensure professionals earn a high income
A) b) To provide funding for the PRBs B) a) To supervise and control the PRBs C) d) To ignore the PRBs D) c) To compete with the PRBs
A) b) Mandating Continuing Professional Development (CPD) B) a) Implementing rigorous licensure examinations C) c) Encouraging research and innovation in professional fields D) d) Guaranteeing employment for all professionals
A) d) To limit the scope of practice for professionals B) b) To ensure professionals meet global benchmarks and can compete internationally C) c) To reduce the cost of professional services D) a) To make it easier for professionals to find jobs
A) b) Higher prices for professional services B) d) Reduced access to professional services C) a) Increased taxes for the public D) c) Enhanced quality and safety of professional services
A) D. Operational discretion B) B. Administrative coordination C) C. Ethical governance D) A. Regulatory compliance
A) B. Ensure standardized training and accountability B) C. Expand the jurisdiction of the PNP C) D. Allow private security to act as quasi-police forces D) A. Reduce the cost of agency operations
A) B. Refuse compliance and justify business necessity B) D. Wait for formal complaint before acting C) A. Report the company to DTI D) C. Uphold the law despite business pressure
A) A. Efficiency over legality B) C. Profit-driven motivation C) B. Integration of competence and accountability D) D. Centralized command approach
A) C. Professional autonomy and responsibility B) B. Managerial compliance C) A. Ethical minimalism D) D. Administrative hierarchy
A) A. A guard ignores customer concerns to maintain discipline B) B. A guard de-escalates a confrontation through calm communication C) D. A guard prioritizes rules over empathy D) C. A guard detains a customer for minor inconvenience
A) C. Involves court procedures B) D. Deals only with insider theft C) A. Focuses on criminal liability D) B. Aims to anticipate threats for decision-making
A) C. Overstepping of duties B) B. Coordination of customer relations with safety protoco C) A. Violation of safety ethics D) D. Failure of situational awareness
A) A. Assertive body language B) D. Physical authority C) C. Verbal dominance D) B. Emotional intelligence and restraint
A) A. Detecting minor violations B) D. Collecting data without analysis C) C. Focusing on post-crime reporting D) B. Predicting business risks through information synthesis
A) B. Customer-centred communication and conflict de-escalation B) D. Defensive compliance to avoid escalation C) C. Strict enforcement without compromise D) A. Command presence over customers
A) D. Emergency command protocol B) C. Safety communication ethics C) A. Reporting chain of command D) B. Preventive risk escalation
A) B. Operational discipline B) A. Uniform compliance C) C. Personal safety and incident prevention D) D. Administrative reporting
A) B. Violates impartiality and universal duty of care in emergency protocol B) A. Acceptable prioritization since VIPs are high-value clients C) C. Logistically correct because VIPs move faster and clear exits sooner D) D. Proper since client satisfaction is primary in service delivery
A) D. Enforce stricter penalties for slow response times B) B. Continue the policy without modification C) C. Reassess workflow to integrate courtesy without compromising readiness D) A. Discontinue the new greeting to restore speed
A) c) Integrate comprehensive customer service training, including active listening and empathy, into the security team's ongoing professional development. B) a) Replace the entire security team with personnel from a customer service background. C) d) Reduce the security team's interaction with customers to minimize potential conflicts D) b) Implement a zero-tolerance policy for complaints against security personne
A) d) A comfortable chair B) a) A stylish outfit. C) b) A balanced diet and regular exercise. D) c) A first-aid kit.
A) c) Conduct a thorough review of existing security protocols, identify areas of unnecessary friction, and implement user-friendly alternatives while reinforcing security awareness training. B) b) Ignore the breaches to avoid disrupting employee morale and productivity. C) d) Implement stricter, more complex security protocols to deter future breaches, regardless of the impact on productivity D) a) Immediately terminate all employees who bypassed security protocols.
A) c) A combination of reduced security incidents, improved employee awareness scores, and positive customer feedback on security interactions B) a) The number of security drills conducted per year. C) b) The amount of money spent on security technology and personnel D) d) The number of security certifications held by security personnel.
A) d) Publicly confront the individual and demand an explanation in front of other employees and visitors. B) a) Immediately alert all security personnel and initiate a lockdown of the facility C) b) Ignore the situation unless the individual successfully gains access to the restricted area. D) c) Discreetly approach the individual, politely inquire about their identity and purpose, and verify the validity of the keycard
A) A. Customer relations and crisis communication B) B. Surveillance techniques C) D. Firearms proficiency D) C. Legal procedures
A) B. Excessive procedural compliance B) A. Poor information integration C) D. Lack of physical deterrence D) C. Overreliance on electronic systems
A) D. cooperation B) C. deterrence C) A. detection D) B. discipline
A) D. Cost of materials used B) A. Reduction in incident recurrence after implementation C) C. Frequency of drills D) B. Number of employees trained
A) A. Integrate human relations training with corporate intelligence modules B) B. Replace personnel with IT-based monitoring C) D. Focus solely on surveillance hardware D) C. Isolate intelligence from guest operations
A) A. Allow entry to avoid conflict, since the visitor claims VIP status. B) C. Maintain composure, explain the protocol’s importance in a respectful manner, and discreetly verify with superiors if exceptions apply. C) B. Call for backup immediately and confront the visitor in a firm tone D) D. Deny entry outright and warn the visitor that noncompliance is a violation
A) B. Conduct discreet surveillance and document patterns before informing management B) C. Immediately suspend the employee pending investigation. C) D. Ignore the activity until concrete proof of data theft is found. D) A. Publicly confront the employee to make an example for others.
A) C. Corporate flexibility B) D. Conflict prevention C) B. Operational discipline D) A. Convenience of service
A) D. Repeat the drill without feedback to ensure familiarity B) C. Conduct a debriefing to identify behavioral gaps and emphasize real-world implications of non-compliance. C) B. Submit a report and recommend termination for those who disobey. D) A. Penalize all non-participants immediately
A) D. Justifiable only if ordered by management. B) B. Acceptable if done discreetly. C) C. Unethical because it violates privacy rights and due process, regardless of motive. D) A. Acceptable if it prevents corporate loss.
A) C. Interview employees first, then design new policies without physical inspection. B) B. Begin with site observation, followed by data gathering, risk identification, and recommendation of layered security measures. C) A. Conduct risk assessment only after incidents occur D) D. Draft security protocols immediately without environmental scanning.
A) B. Risky because technological reliance reduces deterrence and real-time response B) A. Acceptable since technology can replace manpower C) C. Efficient because it saves manpower resources. D) D. Permissible if incidents are infrequent.
A) B. Controlling and mitigating identified threats B) D. Recruiting qualified guards C) A. Responding to emergencies D) C. Recording all incidents
A) A. Strengthen digital access control and implement strict data classification protocols. B) D. Increase surveillance on all staff computers without consent. C) B. Dismiss the employee immediately to set an example. D) C. Restrict all email communications without policy review.
A) C. Strategic redundancy and recovery implementation B) D. Insurance claim processing C) A. Emergency response readiness D) B. Facility evacuation procedures
A) B. Developing an incident response plan B) D. Conducting employee drills C) C. Installing more lighting D) A. Hiring additional guards
A) D. Corporate image B) A. Access credentials C) C. Firewalls and passwords D) B. Trust and reliability
A) B. Proactive and integrative B) A. Reactive and segment C) D. Defensive and passive D) C. Procedural and limited
A) A. Security audit B) D. Loss estimation C) C. Threat profiling D) B. Risk quantification
A) B. Cause and effect B) D. Fire and extinguisher C) C. Plan and rehearsal D) A. Lock and key
A) D. Overdelegation of duties B) C. Too much documentation C) A. Lack of dynamic threat simulation D) B. Excessive focus on fire safety
A) C. Asset visibility B) D. Guard rotation C) A. Data confidentiality D) B. Access control
A) D. Hiring external auditors post-crisis B) B. Immediate employee retraining C) C. Acquisition of insurance policy only D) A. Rapid operational recovery despite facility damage
A) D. Writing a generic safety report B) B. Listing all available equipment C) C. Interviewing random employees only D) A. Linking identified vulnerabilities with risk probability and consequence
A) A. Cost-benefit ratio versus threat likelihood B) B. Supervisor preference C) C. Client demand D) D. Legal documentation alone
A) c) Assessing the external threats and vulnerabilities of the new location. B) a) Installing the latest security technology. C) b) Reviewing the company’s existing security policies and procedures. D) d) Interviewing all employees to gather their security concerns.
A) b) A detailed passenger manifest. B) a) A fresh coat of paint. C) d) A fully stocked galley. D) c) A well-trained crew following emergency protocols
A) b) Implement stricter penalties for employees who violate data security policies B) a) Increase the budget for cybersecurity software. C) c) Conduct a comprehensive risk assessment, update document and information security protocols, and provide regular training to employees on data protection best practices. D) d) Hire more IT personnel to monitor network traffic
A) c) A combination of reduced security incidents, successful perimeter breach attempts, and employee feedback on safety perceptions. B) d) The amount of money spent on physical security equipment and personnel C) a) The number of security cameras installed on the premises D) b) The number of security guards patrolling the facility.
A) d) Publicly confront the applicant and demand an explanation for the misrepresentation. B) c) Conduct a thorough investigation to verify the accuracy of the applicant’s information and assess the potential risk to the organization. C) a) Immediately reject the applicant without further consideration. D) b) Ignore the discrepancy if the applicant is otherwise qualified
A) B. Surveillance compensates for procedural lapses B) A.Physical security measures are effective and sufficient. C) C. The human element in access control weakens an otherwise strong system D) D. The tailgating issue is minor since no breach has yet occurred.
A) A. Technology dependence versus manpower redundancy B) C. Budget allocation versus client perception C) D. Legal compliance versus administrative convenience D) B. Physical barrier design versus emergency evacuation speed
A) A. Records retrieval efficiency B) B. Confidentiality and integrity assurance C) D. Archival accessibility D) C. Data digitization accuracy
A) C. Efficient communication outweighs minor risk B) A. Acceptable since recipients are authorized C) B. Violation of confidentiality principle due to insecure transmission medium D) D. Minor issue if files are later deleted
A) C. Ineffective background investigation B) A. Failure of physical access control C) D. Inadequate visitor management procedures D) B. Overemphasis on perimeter defense, neglecting information security policy
A) A. Creating a centralized business district to encourage economic growth B) C. Zoning residential areas with clear boundaries and layered access control C) D. Promoting walkable streets to enhance community interaction D) B. Installing CCTV cameras at every street corner to reduce crime
A) D. The use of modern materials prone to forced entry B) A. Absence of defensive architecture like bollards C) C. Overcrowding of retail shops limiting natural surveillance D) B. Excessive transparency in façade design reducing perceived control
A) B. Utilitarian – Urban greenspaces reduce crime and promote overall public well- being B) A. Deontological – Urban greenery is a duty of the government regardless of outcomes C) D. Social Contract – Citizens must follow rules set by planners who include greenspaces D) C. Virtue Ethics – Green areas reflect the moral character of urban developers
A) C. Mixed-use developments with passive surveillance and active frontage B) B. Narrow alleyways with overhead motion sensors C) A. High steel perimeter fencing with monitored gates D) D. Isolated parks with hidden CCTV systems
A) B. Development B poses higher security risk due to permeability and openness B) C. Development B fosters natural surveillance and community ownership, making it more resilient. C) A. Development A is more secure due to limited access and high boundary protection. D) D. Development A exemplifies CPTED by reducing opportunities for observation by outsiders.
A) B. It violates basic environmental design principles by increasing opportunities for concealment and crime. B) A. It optimizes business space and should proceed. C) C. It aligns with traditional architectural philosophy. D) D. It can be justified if CCTV coverage is installed
A) B. Function and resilience must harmonize with design — security and safety are integral, not decorative B) D. Architects are solely responsible for aesthetic integrity, not safety measures. C) C. Security can be an afterthought once design is complete. D) A. Form should always follow aesthetics.
A) A. Enforcement of zoning laws B) D. Reducing architectural costs C) B. Empowering occupants to control territorial space D) C. Relying on mechanical security systems
A) D. Community programs are outdated in modern cities B) C. Automation guarantees total safety C) A. Security should rely solely on advanced technology. D) B. Overreliance on surveillance undermines human-centered, layered defense principles
A) C. Effective safety is achieved when design minimizes human error and supports policy compliance. B) A. Security policies should adapt to physical limitations. C) B. Human behavior is unpredictable, so only technology ensures safety. D) D. Architectural design has no ethical impact on security management.
A) A. Psychological deterrence B) D. Passive surveillance C) B. Crime prevention through environmental design (CPTED) D) C. Reactive defense
A) A. Comfort B) D. Safety C) B. Efficiency D) C. Discipline
A) C. Natural surveillance B) A. Human factor engineering C) C. Natural surveillance D) B. Target hardening
A) D. Social Learning Theory B) A. Rational Choice Theory C) C. Broken Windows Theory D) B. Environmental Criminology
A) B. Assessing how structure supports prevention B) D. Measuring employee satisfaction C) C. Estimating construction cost D) A. Checking building aesthetics
A) A. Target Hardening B) B. Defensible Space C) C. Natural Surveillance D) D. Territorial Reinforcement
A) A. Environmental Aesthetics B) C. Human-Centered Design C) D. Symbolic Security D) B. Access Control
A) C. Defensible Space B) A. Territoriality C) D. Security Zoning D) B. Natural Surveillance
A) C. Environmental Deterrence B) A. Human-Centered Security Design C) D. Situational Hardening D) B. Symbolic Architecture
A) A. CPTED B) B. Routine Activity Theory C) C. Broken Windows Theory D) D. Rational Choice Theory
A) a) Installing high fences around the park and limiting access to daylight hours. B) d) Redesigning the park to include clear sightlines, well-maintained landscaping, community gardens, and designated activity areas to encourage legitimate use and natural surveillance. C) c) Removing all vegetation to eliminate hiding places and installing bright, glaring lights. D) b) Increasing police patrols and installing surveillance cameras throughout the park.
A) a) Creating a fortress-like structure with minimal windows and a single, heavily guarded entrance. B) c) Relying solely on a highly trained security force to patrol the building and monitor visitor access. C) b) Implementing a series of increasingly restrictive security measures, starting with a welcoming public lobby and progressing to controlled access points for sensitive areas, utilizing technology like biometrics and smart cards D) d) Eliminating all public access and conducting all business remotely.
A) c) Over-policing and discriminatory practices in marginalized communities. B) a) A decrease in property values in low-income neighborhoods C) b) An increase in serious crime rates. D) d) A decline in community engagement and social cohesion.
A) c) Utilizing a combination of reinforced display cases with advanced sensors, layered access control systems, real-time video analytics, and strategically placed architectural barriers to deter and detect potential threats. B) d) Purchasing insurance policies to cover the potential loss of artifacts C) b) Displaying artifacts in glass cases with basic alarms and relying on security guards to monitor the exhibits D) a) Storing all artifacts in a single, highly secure vault with limited access.
A) c) Implementing strict curfews and loitering laws B) d) Separating residential areas from commercial zones to educe crime. C) b) Encouraging a vibrant mix of land uses and pedestrian activity to create a safer and more engaging public realm D) a) Installing surveillance cameras on every street corner |