A) A. Optimization of manpower B) B. Standardization of post duties C) C. Compliance to service contract obligations D) D. Rotation of personnel
A) B. A manager integrates security protocols with disaster preparedness plans B) A. A manager assigns guards based on seniority C) D. A manager limits guard functions to access control D) C. A manager focuses on surveillance only
A) B. A mechanic adjusting tools for faster repair B) D. A farmer changing planting schedules C) A. A doctor maintaining continuous medical education D) C. A clerk following old company rules
A) B. Elevating security management to a recognized profession B) D. Encouraging more commercial licenses C) A. Promoting security as mere enforcement D) C. Restricting entry into the field of private protection
A) D. Participation in PNP-SOSIA certification B) B. Seminar on modern threat response C) C. Renewal of license without retraining D) A. Annual re-training of guards
A) A. Professional regulation and accountability B) C. Managerial discretion in deployment C) D. Training exemption clause D) B. Operational flexibility of agencies
A) B. Implementing continuing professional development and ethics training B) A. Reducing the guard-to-client ratio C) D. Limiting the scope of internal audits D) C. Outsourcing background checks
A) A. The Labor Code is to employment B) C. The Penal Code is to punishment C) D. The NBI Charter is to investigation D) B. The Civil Code is to property
A) D. It reduces administrative load B) A. It violates regulatory competence standards C) B. It aligns with practical field operations D) C. It promotes efficient manpower use
A) A. Reduced turnover due to higher wages B) D. Decrease in security awareness training C) B. Consistent adherence to competency-based performance standards D) C. Increase in unregistered security firms
A) A. Efficiency in operations B) B. Ethical accountability C) C. Institutional autonomy D) D. Corporate sustainability
A) A. Delegation of authority B) C. Fiscal accountability C) B. Regulatory compliance in operational management D) D. Administrative discretion
A) D. A corporate lawyer bound by IBP ethics B) C. A private bank following BSP risk assessment C) A. A private nurse working under DOH regulation D) B. A barangay tanod acting as a police auxiliary
A) D. The frequency of policy updates B) C. The ratio of guards to clients C) B. The consistency of security actions with ethical standards D) A. The number of personnel trained annually
A) C. Managers outsourcing training programs B) B. Guards exercising discretion guided by legal standards C) D. Agencies avoiding government audits D) A. Security firms competing for higher pay rates
A) d) To promote competition among professionals B) c) To limit the number of professionals in a specific field C) b) To provide guidelines for professional conduct and integrity D) a) To ensure professionals earn a high income
A) a) To supervise and control the PRBs B) b) To provide funding for the PRBs C) d) To ignore the PRBs D) c) To compete with the PRBs
A) b) Mandating Continuing Professional Development (CPD) B) d) Guaranteeing employment for all professionals C) c) Encouraging research and innovation in professional fields D) a) Implementing rigorous licensure examinations
A) d) To limit the scope of practice for professionals B) a) To make it easier for professionals to find jobs C) c) To reduce the cost of professional services D) b) To ensure professionals meet global benchmarks and can compete internationally
A) c) Enhanced quality and safety of professional services B) b) Higher prices for professional services C) d) Reduced access to professional services D) a) Increased taxes for the public
A) A. Regulatory compliance B) C. Ethical governance C) D. Operational discretion D) B. Administrative coordination
A) B. Ensure standardized training and accountability B) A. Reduce the cost of agency operations C) C. Expand the jurisdiction of the PNP D) D. Allow private security to act as quasi-police forces
A) B. Refuse compliance and justify business necessity B) C. Uphold the law despite business pressure C) A. Report the company to DTI D) D. Wait for formal complaint before acting
A) A. Efficiency over legality B) D. Centralized command approach C) B. Integration of competence and accountability D) C. Profit-driven motivation
A) A. Ethical minimalism B) B. Managerial compliance C) C. Professional autonomy and responsibility D) D. Administrative hierarchy
A) D. A guard prioritizes rules over empathy B) C. A guard detains a customer for minor inconvenience C) A. A guard ignores customer concerns to maintain discipline D) B. A guard de-escalates a confrontation through calm communication
A) B. Aims to anticipate threats for decision-making B) C. Involves court procedures C) A. Focuses on criminal liability D) D. Deals only with insider theft
A) A. Violation of safety ethics B) B. Coordination of customer relations with safety protoco C) D. Failure of situational awareness D) C. Overstepping of duties
A) A. Assertive body language B) B. Emotional intelligence and restraint C) D. Physical authority D) C. Verbal dominance
A) B. Predicting business risks through information synthesis B) D. Collecting data without analysis C) A. Detecting minor violations D) C. Focusing on post-crime reporting
A) C. Strict enforcement without compromise B) D. Defensive compliance to avoid escalation C) A. Command presence over customers D) B. Customer-centred communication and conflict de-escalation
A) B. Preventive risk escalation B) D. Emergency command protocol C) C. Safety communication ethics D) A. Reporting chain of command
A) A. Uniform compliance B) D. Administrative reporting C) B. Operational discipline D) C. Personal safety and incident prevention
A) C. Logistically correct because VIPs move faster and clear exits sooner B) A. Acceptable prioritization since VIPs are high-value clients C) B. Violates impartiality and universal duty of care in emergency protocol D) D. Proper since client satisfaction is primary in service delivery
A) C. Reassess workflow to integrate courtesy without compromising readiness B) B. Continue the policy without modification C) A. Discontinue the new greeting to restore speed D) D. Enforce stricter penalties for slow response times
A) d) Reduce the security team's interaction with customers to minimize potential conflicts B) c) Integrate comprehensive customer service training, including active listening and empathy, into the security team's ongoing professional development. C) a) Replace the entire security team with personnel from a customer service background. D) b) Implement a zero-tolerance policy for complaints against security personne
A) d) A comfortable chair B) a) A stylish outfit. C) c) A first-aid kit. D) b) A balanced diet and regular exercise.
A) a) Immediately terminate all employees who bypassed security protocols. B) c) Conduct a thorough review of existing security protocols, identify areas of unnecessary friction, and implement user-friendly alternatives while reinforcing security awareness training. C) b) Ignore the breaches to avoid disrupting employee morale and productivity. D) d) Implement stricter, more complex security protocols to deter future breaches, regardless of the impact on productivity
A) a) The number of security drills conducted per year. B) d) The number of security certifications held by security personnel. C) c) A combination of reduced security incidents, improved employee awareness scores, and positive customer feedback on security interactions D) b) The amount of money spent on security technology and personnel
A) a) Immediately alert all security personnel and initiate a lockdown of the facility B) b) Ignore the situation unless the individual successfully gains access to the restricted area. C) d) Publicly confront the individual and demand an explanation in front of other employees and visitors. D) c) Discreetly approach the individual, politely inquire about their identity and purpose, and verify the validity of the keycard
A) C. Legal procedures B) A. Customer relations and crisis communication C) B. Surveillance techniques D) D. Firearms proficiency
A) C. Overreliance on electronic systems B) B. Excessive procedural compliance C) D. Lack of physical deterrence D) A. Poor information integration
A) B. discipline B) C. deterrence C) A. detection D) D. cooperation
A) A. Reduction in incident recurrence after implementation B) C. Frequency of drills C) B. Number of employees trained D) D. Cost of materials used
A) A. Integrate human relations training with corporate intelligence modules B) B. Replace personnel with IT-based monitoring C) C. Isolate intelligence from guest operations D) D. Focus solely on surveillance hardware
A) C. Maintain composure, explain the protocol’s importance in a respectful manner, and discreetly verify with superiors if exceptions apply. B) A. Allow entry to avoid conflict, since the visitor claims VIP status. C) B. Call for backup immediately and confront the visitor in a firm tone D) D. Deny entry outright and warn the visitor that noncompliance is a violation
A) A. Publicly confront the employee to make an example for others. B) B. Conduct discreet surveillance and document patterns before informing management C) C. Immediately suspend the employee pending investigation. D) D. Ignore the activity until concrete proof of data theft is found.
A) A. Convenience of service B) D. Conflict prevention C) C. Corporate flexibility D) B. Operational discipline
A) D. Repeat the drill without feedback to ensure familiarity B) A. Penalize all non-participants immediately C) C. Conduct a debriefing to identify behavioral gaps and emphasize real-world implications of non-compliance. D) B. Submit a report and recommend termination for those who disobey.
A) C. Unethical because it violates privacy rights and due process, regardless of motive. B) B. Acceptable if done discreetly. C) A. Acceptable if it prevents corporate loss. D) D. Justifiable only if ordered by management.
A) A. Conduct risk assessment only after incidents occur B) C. Interview employees first, then design new policies without physical inspection. C) B. Begin with site observation, followed by data gathering, risk identification, and recommendation of layered security measures. D) D. Draft security protocols immediately without environmental scanning.
A) D. Permissible if incidents are infrequent. B) C. Efficient because it saves manpower resources. C) B. Risky because technological reliance reduces deterrence and real-time response D) A. Acceptable since technology can replace manpower
A) B. Controlling and mitigating identified threats B) A. Responding to emergencies C) C. Recording all incidents D) D. Recruiting qualified guards
A) C. Restrict all email communications without policy review. B) A. Strengthen digital access control and implement strict data classification protocols. C) D. Increase surveillance on all staff computers without consent. D) B. Dismiss the employee immediately to set an example.
A) C. Strategic redundancy and recovery implementation B) A. Emergency response readiness C) B. Facility evacuation procedures D) D. Insurance claim processing
A) C. Installing more lighting B) D. Conducting employee drills C) B. Developing an incident response plan D) A. Hiring additional guards
A) D. Corporate image B) C. Firewalls and passwords C) B. Trust and reliability D) A. Access credentials
A) C. Procedural and limited B) A. Reactive and segment C) B. Proactive and integrative D) D. Defensive and passive
A) B. Risk quantification B) A. Security audit C) D. Loss estimation D) C. Threat profiling
A) A. Lock and key B) B. Cause and effect C) C. Plan and rehearsal D) D. Fire and extinguisher
A) D. Overdelegation of duties B) A. Lack of dynamic threat simulation C) B. Excessive focus on fire safety D) C. Too much documentation
A) A. Data confidentiality B) C. Asset visibility C) D. Guard rotation D) B. Access control
A) C. Acquisition of insurance policy only B) A. Rapid operational recovery despite facility damage C) D. Hiring external auditors post-crisis D) B. Immediate employee retraining
A) B. Listing all available equipment B) D. Writing a generic safety report C) C. Interviewing random employees only D) A. Linking identified vulnerabilities with risk probability and consequence
A) A. Cost-benefit ratio versus threat likelihood B) D. Legal documentation alone C) C. Client demand D) B. Supervisor preference
A) a) Installing the latest security technology. B) c) Assessing the external threats and vulnerabilities of the new location. C) d) Interviewing all employees to gather their security concerns. D) b) Reviewing the company’s existing security policies and procedures.
A) c) A well-trained crew following emergency protocols B) d) A fully stocked galley. C) b) A detailed passenger manifest. D) a) A fresh coat of paint.
A) d) Hire more IT personnel to monitor network traffic B) c) Conduct a comprehensive risk assessment, update document and information security protocols, and provide regular training to employees on data protection best practices. C) a) Increase the budget for cybersecurity software. D) b) Implement stricter penalties for employees who violate data security policies
A) c) A combination of reduced security incidents, successful perimeter breach attempts, and employee feedback on safety perceptions. B) b) The number of security guards patrolling the facility. C) d) The amount of money spent on physical security equipment and personnel D) a) The number of security cameras installed on the premises
A) c) Conduct a thorough investigation to verify the accuracy of the applicant’s information and assess the potential risk to the organization. B) a) Immediately reject the applicant without further consideration. C) b) Ignore the discrepancy if the applicant is otherwise qualified D) d) Publicly confront the applicant and demand an explanation for the misrepresentation.
A) D. The tailgating issue is minor since no breach has yet occurred. B) C. The human element in access control weakens an otherwise strong system C) A.Physical security measures are effective and sufficient. D) B. Surveillance compensates for procedural lapses
A) D. Legal compliance versus administrative convenience B) A. Technology dependence versus manpower redundancy C) C. Budget allocation versus client perception D) B. Physical barrier design versus emergency evacuation speed
A) B. Confidentiality and integrity assurance B) A. Records retrieval efficiency C) C. Data digitization accuracy D) D. Archival accessibility
A) D. Minor issue if files are later deleted B) C. Efficient communication outweighs minor risk C) B. Violation of confidentiality principle due to insecure transmission medium D) A. Acceptable since recipients are authorized
A) B. Overemphasis on perimeter defense, neglecting information security policy B) D. Inadequate visitor management procedures C) C. Ineffective background investigation D) A. Failure of physical access control
A) C. Zoning residential areas with clear boundaries and layered access control B) B. Installing CCTV cameras at every street corner to reduce crime C) A. Creating a centralized business district to encourage economic growth D) D. Promoting walkable streets to enhance community interaction
A) A. Absence of defensive architecture like bollards B) B. Excessive transparency in façade design reducing perceived control C) D. The use of modern materials prone to forced entry D) C. Overcrowding of retail shops limiting natural surveillance
A) A. Deontological – Urban greenery is a duty of the government regardless of outcomes B) D. Social Contract – Citizens must follow rules set by planners who include greenspaces C) C. Virtue Ethics – Green areas reflect the moral character of urban developers D) B. Utilitarian – Urban greenspaces reduce crime and promote overall public well- being
A) C. Mixed-use developments with passive surveillance and active frontage B) D. Isolated parks with hidden CCTV systems C) A. High steel perimeter fencing with monitored gates D) B. Narrow alleyways with overhead motion sensors
A) A. Development A is more secure due to limited access and high boundary protection. B) C. Development B fosters natural surveillance and community ownership, making it more resilient. C) D. Development A exemplifies CPTED by reducing opportunities for observation by outsiders. D) B. Development B poses higher security risk due to permeability and openness
A) D. It can be justified if CCTV coverage is installed B) C. It aligns with traditional architectural philosophy. C) B. It violates basic environmental design principles by increasing opportunities for concealment and crime. D) A. It optimizes business space and should proceed.
A) D. Architects are solely responsible for aesthetic integrity, not safety measures. B) C. Security can be an afterthought once design is complete. C) B. Function and resilience must harmonize with design — security and safety are integral, not decorative D) A. Form should always follow aesthetics.
A) A. Enforcement of zoning laws B) B. Empowering occupants to control territorial space C) D. Reducing architectural costs D) C. Relying on mechanical security systems
A) C. Automation guarantees total safety B) A. Security should rely solely on advanced technology. C) B. Overreliance on surveillance undermines human-centered, layered defense principles D) D. Community programs are outdated in modern cities
A) C. Effective safety is achieved when design minimizes human error and supports policy compliance. B) A. Security policies should adapt to physical limitations. C) D. Architectural design has no ethical impact on security management. D) B. Human behavior is unpredictable, so only technology ensures safety.
A) B. Crime prevention through environmental design (CPTED) B) D. Passive surveillance C) A. Psychological deterrence D) C. Reactive defense
A) A. Comfort B) C. Discipline C) B. Efficiency D) D. Safety
A) C. Natural surveillance B) C. Natural surveillance C) B. Target hardening D) A. Human factor engineering
A) A. Rational Choice Theory B) D. Social Learning Theory C) C. Broken Windows Theory D) B. Environmental Criminology
A) C. Estimating construction cost B) B. Assessing how structure supports prevention C) D. Measuring employee satisfaction D) A. Checking building aesthetics
A) B. Defensible Space B) C. Natural Surveillance C) A. Target Hardening D) D. Territorial Reinforcement
A) C. Human-Centered Design B) B. Access Control C) A. Environmental Aesthetics D) D. Symbolic Security
A) A. Territoriality B) C. Defensible Space C) D. Security Zoning D) B. Natural Surveillance
A) D. Situational Hardening B) B. Symbolic Architecture C) C. Environmental Deterrence D) A. Human-Centered Security Design
A) D. Rational Choice Theory B) B. Routine Activity Theory C) C. Broken Windows Theory D) A. CPTED
A) a) Installing high fences around the park and limiting access to daylight hours. B) d) Redesigning the park to include clear sightlines, well-maintained landscaping, community gardens, and designated activity areas to encourage legitimate use and natural surveillance. C) c) Removing all vegetation to eliminate hiding places and installing bright, glaring lights. D) b) Increasing police patrols and installing surveillance cameras throughout the park.
A) c) Relying solely on a highly trained security force to patrol the building and monitor visitor access. B) a) Creating a fortress-like structure with minimal windows and a single, heavily guarded entrance. C) b) Implementing a series of increasingly restrictive security measures, starting with a welcoming public lobby and progressing to controlled access points for sensitive areas, utilizing technology like biometrics and smart cards D) d) Eliminating all public access and conducting all business remotely.
A) d) A decline in community engagement and social cohesion. B) a) A decrease in property values in low-income neighborhoods C) c) Over-policing and discriminatory practices in marginalized communities. D) b) An increase in serious crime rates.
A) a) Storing all artifacts in a single, highly secure vault with limited access. B) d) Purchasing insurance policies to cover the potential loss of artifacts C) b) Displaying artifacts in glass cases with basic alarms and relying on security guards to monitor the exhibits D) c) Utilizing a combination of reinforced display cases with advanced sensors, layered access control systems, real-time video analytics, and strategically placed architectural barriers to deter and detect potential threats.
A) d) Separating residential areas from commercial zones to educe crime. B) b) Encouraging a vibrant mix of land uses and pedestrian activity to create a safer and more engaging public realm C) a) Installing surveillance cameras on every street corner D) c) Implementing strict curfews and loitering laws |