A) A. Optimization of manpower B) B. Standardization of post duties C) D. Rotation of personnel D) C. Compliance to service contract obligations
A) C. A manager focuses on surveillance only B) D. A manager limits guard functions to access control C) B. A manager integrates security protocols with disaster preparedness plans D) A. A manager assigns guards based on seniority
A) C. A clerk following old company rules B) D. A farmer changing planting schedules C) A. A doctor maintaining continuous medical education D) B. A mechanic adjusting tools for faster repair
A) A. Promoting security as mere enforcement B) D. Encouraging more commercial licenses C) B. Elevating security management to a recognized profession D) C. Restricting entry into the field of private protection
A) C. Renewal of license without retraining B) B. Seminar on modern threat response C) D. Participation in PNP-SOSIA certification D) A. Annual re-training of guards
A) A. Professional regulation and accountability B) C. Managerial discretion in deployment C) B. Operational flexibility of agencies D) D. Training exemption clause
A) A. Reducing the guard-to-client ratio B) C. Outsourcing background checks C) B. Implementing continuing professional development and ethics training D) D. Limiting the scope of internal audits
A) A. The Labor Code is to employment B) C. The Penal Code is to punishment C) D. The NBI Charter is to investigation D) B. The Civil Code is to property
A) D. It reduces administrative load B) C. It promotes efficient manpower use C) A. It violates regulatory competence standards D) B. It aligns with practical field operations
A) D. Decrease in security awareness training B) B. Consistent adherence to competency-based performance standards C) C. Increase in unregistered security firms D) A. Reduced turnover due to higher wages
A) B. Ethical accountability B) A. Efficiency in operations C) C. Institutional autonomy D) D. Corporate sustainability
A) B. Regulatory compliance in operational management B) A. Delegation of authority C) D. Administrative discretion D) C. Fiscal accountability
A) D. A corporate lawyer bound by IBP ethics B) A. A private nurse working under DOH regulation C) B. A barangay tanod acting as a police auxiliary D) C. A private bank following BSP risk assessment
A) B. The consistency of security actions with ethical standards B) C. The ratio of guards to clients C) D. The frequency of policy updates D) A. The number of personnel trained annually
A) A. Security firms competing for higher pay rates B) B. Guards exercising discretion guided by legal standards C) C. Managers outsourcing training programs D) D. Agencies avoiding government audits
A) b) To provide guidelines for professional conduct and integrity B) c) To limit the number of professionals in a specific field C) d) To promote competition among professionals D) a) To ensure professionals earn a high income
A) b) To provide funding for the PRBs B) d) To ignore the PRBs C) c) To compete with the PRBs D) a) To supervise and control the PRBs
A) c) Encouraging research and innovation in professional fields B) d) Guaranteeing employment for all professionals C) a) Implementing rigorous licensure examinations D) b) Mandating Continuing Professional Development (CPD)
A) a) To make it easier for professionals to find jobs B) b) To ensure professionals meet global benchmarks and can compete internationally C) d) To limit the scope of practice for professionals D) c) To reduce the cost of professional services
A) a) Increased taxes for the public B) c) Enhanced quality and safety of professional services C) d) Reduced access to professional services D) b) Higher prices for professional services
A) B. Administrative coordination B) A. Regulatory compliance C) D. Operational discretion D) C. Ethical governance
A) A. Reduce the cost of agency operations B) B. Ensure standardized training and accountability C) C. Expand the jurisdiction of the PNP D) D. Allow private security to act as quasi-police forces
A) A. Report the company to DTI B) D. Wait for formal complaint before acting C) B. Refuse compliance and justify business necessity D) C. Uphold the law despite business pressure
A) C. Profit-driven motivation B) B. Integration of competence and accountability C) D. Centralized command approach D) A. Efficiency over legality
A) D. Administrative hierarchy B) C. Professional autonomy and responsibility C) A. Ethical minimalism D) B. Managerial compliance
A) C. A guard detains a customer for minor inconvenience B) D. A guard prioritizes rules over empathy C) B. A guard de-escalates a confrontation through calm communication D) A. A guard ignores customer concerns to maintain discipline
A) B. Aims to anticipate threats for decision-making B) A. Focuses on criminal liability C) D. Deals only with insider theft D) C. Involves court procedures
A) B. Coordination of customer relations with safety protoco B) D. Failure of situational awareness C) C. Overstepping of duties D) A. Violation of safety ethics
A) A. Assertive body language B) C. Verbal dominance C) B. Emotional intelligence and restraint D) D. Physical authority
A) B. Predicting business risks through information synthesis B) D. Collecting data without analysis C) C. Focusing on post-crime reporting D) A. Detecting minor violations
A) A. Command presence over customers B) C. Strict enforcement without compromise C) D. Defensive compliance to avoid escalation D) B. Customer-centred communication and conflict de-escalation
A) D. Emergency command protocol B) C. Safety communication ethics C) B. Preventive risk escalation D) A. Reporting chain of command
A) D. Administrative reporting B) B. Operational discipline C) C. Personal safety and incident prevention D) A. Uniform compliance
A) A. Acceptable prioritization since VIPs are high-value clients B) B. Violates impartiality and universal duty of care in emergency protocol C) D. Proper since client satisfaction is primary in service delivery D) C. Logistically correct because VIPs move faster and clear exits sooner
A) C. Reassess workflow to integrate courtesy without compromising readiness B) D. Enforce stricter penalties for slow response times C) B. Continue the policy without modification D) A. Discontinue the new greeting to restore speed
A) c) Integrate comprehensive customer service training, including active listening and empathy, into the security team's ongoing professional development. B) b) Implement a zero-tolerance policy for complaints against security personne C) d) Reduce the security team's interaction with customers to minimize potential conflicts D) a) Replace the entire security team with personnel from a customer service background.
A) d) A comfortable chair B) b) A balanced diet and regular exercise. C) c) A first-aid kit. D) a) A stylish outfit.
A) a) Immediately terminate all employees who bypassed security protocols. B) c) Conduct a thorough review of existing security protocols, identify areas of unnecessary friction, and implement user-friendly alternatives while reinforcing security awareness training. C) b) Ignore the breaches to avoid disrupting employee morale and productivity. D) d) Implement stricter, more complex security protocols to deter future breaches, regardless of the impact on productivity
A) a) The number of security drills conducted per year. B) d) The number of security certifications held by security personnel. C) c) A combination of reduced security incidents, improved employee awareness scores, and positive customer feedback on security interactions D) b) The amount of money spent on security technology and personnel
A) a) Immediately alert all security personnel and initiate a lockdown of the facility B) d) Publicly confront the individual and demand an explanation in front of other employees and visitors. C) b) Ignore the situation unless the individual successfully gains access to the restricted area. D) c) Discreetly approach the individual, politely inquire about their identity and purpose, and verify the validity of the keycard
A) D. Firearms proficiency B) A. Customer relations and crisis communication C) B. Surveillance techniques D) C. Legal procedures
A) B. Excessive procedural compliance B) D. Lack of physical deterrence C) C. Overreliance on electronic systems D) A. Poor information integration
A) A. detection B) D. cooperation C) B. discipline D) C. deterrence
A) B. Number of employees trained B) D. Cost of materials used C) A. Reduction in incident recurrence after implementation D) C. Frequency of drills
A) D. Focus solely on surveillance hardware B) A. Integrate human relations training with corporate intelligence modules C) C. Isolate intelligence from guest operations D) B. Replace personnel with IT-based monitoring
A) A. Allow entry to avoid conflict, since the visitor claims VIP status. B) B. Call for backup immediately and confront the visitor in a firm tone C) C. Maintain composure, explain the protocol’s importance in a respectful manner, and discreetly verify with superiors if exceptions apply. D) D. Deny entry outright and warn the visitor that noncompliance is a violation
A) C. Immediately suspend the employee pending investigation. B) D. Ignore the activity until concrete proof of data theft is found. C) B. Conduct discreet surveillance and document patterns before informing management D) A. Publicly confront the employee to make an example for others.
A) D. Conflict prevention B) A. Convenience of service C) C. Corporate flexibility D) B. Operational discipline
A) C. Conduct a debriefing to identify behavioral gaps and emphasize real-world implications of non-compliance. B) D. Repeat the drill without feedback to ensure familiarity C) A. Penalize all non-participants immediately D) B. Submit a report and recommend termination for those who disobey.
A) C. Unethical because it violates privacy rights and due process, regardless of motive. B) B. Acceptable if done discreetly. C) A. Acceptable if it prevents corporate loss. D) D. Justifiable only if ordered by management.
A) A. Conduct risk assessment only after incidents occur B) C. Interview employees first, then design new policies without physical inspection. C) D. Draft security protocols immediately without environmental scanning. D) B. Begin with site observation, followed by data gathering, risk identification, and recommendation of layered security measures.
A) C. Efficient because it saves manpower resources. B) A. Acceptable since technology can replace manpower C) B. Risky because technological reliance reduces deterrence and real-time response D) D. Permissible if incidents are infrequent.
A) A. Responding to emergencies B) D. Recruiting qualified guards C) C. Recording all incidents D) B. Controlling and mitigating identified threats
A) D. Increase surveillance on all staff computers without consent. B) B. Dismiss the employee immediately to set an example. C) C. Restrict all email communications without policy review. D) A. Strengthen digital access control and implement strict data classification protocols.
A) C. Strategic redundancy and recovery implementation B) B. Facility evacuation procedures C) A. Emergency response readiness D) D. Insurance claim processing
A) B. Developing an incident response plan B) C. Installing more lighting C) D. Conducting employee drills D) A. Hiring additional guards
A) C. Firewalls and passwords B) A. Access credentials C) D. Corporate image D) B. Trust and reliability
A) D. Defensive and passive B) C. Procedural and limited C) A. Reactive and segment D) B. Proactive and integrative
A) D. Loss estimation B) B. Risk quantification C) A. Security audit D) C. Threat profiling
A) D. Fire and extinguisher B) A. Lock and key C) C. Plan and rehearsal D) B. Cause and effect
A) C. Too much documentation B) B. Excessive focus on fire safety C) A. Lack of dynamic threat simulation D) D. Overdelegation of duties
A) C. Asset visibility B) B. Access control C) D. Guard rotation D) A. Data confidentiality
A) B. Immediate employee retraining B) A. Rapid operational recovery despite facility damage C) D. Hiring external auditors post-crisis D) C. Acquisition of insurance policy only
A) C. Interviewing random employees only B) A. Linking identified vulnerabilities with risk probability and consequence C) D. Writing a generic safety report D) B. Listing all available equipment
A) A. Cost-benefit ratio versus threat likelihood B) D. Legal documentation alone C) C. Client demand D) B. Supervisor preference
A) d) Interviewing all employees to gather their security concerns. B) c) Assessing the external threats and vulnerabilities of the new location. C) b) Reviewing the company’s existing security policies and procedures. D) a) Installing the latest security technology.
A) b) A detailed passenger manifest. B) a) A fresh coat of paint. C) d) A fully stocked galley. D) c) A well-trained crew following emergency protocols
A) a) Increase the budget for cybersecurity software. B) d) Hire more IT personnel to monitor network traffic C) c) Conduct a comprehensive risk assessment, update document and information security protocols, and provide regular training to employees on data protection best practices. D) b) Implement stricter penalties for employees who violate data security policies
A) d) The amount of money spent on physical security equipment and personnel B) c) A combination of reduced security incidents, successful perimeter breach attempts, and employee feedback on safety perceptions. C) b) The number of security guards patrolling the facility. D) a) The number of security cameras installed on the premises
A) c) Conduct a thorough investigation to verify the accuracy of the applicant’s information and assess the potential risk to the organization. B) d) Publicly confront the applicant and demand an explanation for the misrepresentation. C) b) Ignore the discrepancy if the applicant is otherwise qualified D) a) Immediately reject the applicant without further consideration.
A) B. Surveillance compensates for procedural lapses B) D. The tailgating issue is minor since no breach has yet occurred. C) C. The human element in access control weakens an otherwise strong system D) A.Physical security measures are effective and sufficient.
A) C. Budget allocation versus client perception B) D. Legal compliance versus administrative convenience C) A. Technology dependence versus manpower redundancy D) B. Physical barrier design versus emergency evacuation speed
A) D. Archival accessibility B) C. Data digitization accuracy C) A. Records retrieval efficiency D) B. Confidentiality and integrity assurance
A) A. Acceptable since recipients are authorized B) B. Violation of confidentiality principle due to insecure transmission medium C) C. Efficient communication outweighs minor risk D) D. Minor issue if files are later deleted
A) B. Overemphasis on perimeter defense, neglecting information security policy B) C. Ineffective background investigation C) A. Failure of physical access control D) D. Inadequate visitor management procedures
A) D. Promoting walkable streets to enhance community interaction B) C. Zoning residential areas with clear boundaries and layered access control C) A. Creating a centralized business district to encourage economic growth D) B. Installing CCTV cameras at every street corner to reduce crime
A) A. Absence of defensive architecture like bollards B) B. Excessive transparency in façade design reducing perceived control C) C. Overcrowding of retail shops limiting natural surveillance D) D. The use of modern materials prone to forced entry
A) A. Deontological – Urban greenery is a duty of the government regardless of outcomes B) C. Virtue Ethics – Green areas reflect the moral character of urban developers C) B. Utilitarian – Urban greenspaces reduce crime and promote overall public well- being D) D. Social Contract – Citizens must follow rules set by planners who include greenspaces
A) C. Mixed-use developments with passive surveillance and active frontage B) D. Isolated parks with hidden CCTV systems C) A. High steel perimeter fencing with monitored gates D) B. Narrow alleyways with overhead motion sensors
A) B. Development B poses higher security risk due to permeability and openness B) D. Development A exemplifies CPTED by reducing opportunities for observation by outsiders. C) A. Development A is more secure due to limited access and high boundary protection. D) C. Development B fosters natural surveillance and community ownership, making it more resilient.
A) B. It violates basic environmental design principles by increasing opportunities for concealment and crime. B) C. It aligns with traditional architectural philosophy. C) D. It can be justified if CCTV coverage is installed D) A. It optimizes business space and should proceed.
A) A. Form should always follow aesthetics. B) C. Security can be an afterthought once design is complete. C) B. Function and resilience must harmonize with design — security and safety are integral, not decorative D) D. Architects are solely responsible for aesthetic integrity, not safety measures.
A) B. Empowering occupants to control territorial space B) D. Reducing architectural costs C) A. Enforcement of zoning laws D) C. Relying on mechanical security systems
A) C. Automation guarantees total safety B) D. Community programs are outdated in modern cities C) A. Security should rely solely on advanced technology. D) B. Overreliance on surveillance undermines human-centered, layered defense principles
A) B. Human behavior is unpredictable, so only technology ensures safety. B) A. Security policies should adapt to physical limitations. C) C. Effective safety is achieved when design minimizes human error and supports policy compliance. D) D. Architectural design has no ethical impact on security management.
A) A. Psychological deterrence B) B. Crime prevention through environmental design (CPTED) C) D. Passive surveillance D) C. Reactive defense
A) B. Efficiency B) A. Comfort C) C. Discipline D) D. Safety
A) C. Natural surveillance B) C. Natural surveillance C) B. Target hardening D) A. Human factor engineering
A) D. Social Learning Theory B) C. Broken Windows Theory C) A. Rational Choice Theory D) B. Environmental Criminology
A) B. Assessing how structure supports prevention B) D. Measuring employee satisfaction C) A. Checking building aesthetics D) C. Estimating construction cost
A) A. Target Hardening B) C. Natural Surveillance C) D. Territorial Reinforcement D) B. Defensible Space
A) B. Access Control B) C. Human-Centered Design C) D. Symbolic Security D) A. Environmental Aesthetics
A) C. Defensible Space B) D. Security Zoning C) B. Natural Surveillance D) A. Territoriality
A) C. Environmental Deterrence B) D. Situational Hardening C) B. Symbolic Architecture D) A. Human-Centered Security Design
A) C. Broken Windows Theory B) D. Rational Choice Theory C) A. CPTED D) B. Routine Activity Theory
A) a) Installing high fences around the park and limiting access to daylight hours. B) b) Increasing police patrols and installing surveillance cameras throughout the park. C) d) Redesigning the park to include clear sightlines, well-maintained landscaping, community gardens, and designated activity areas to encourage legitimate use and natural surveillance. D) c) Removing all vegetation to eliminate hiding places and installing bright, glaring lights.
A) d) Eliminating all public access and conducting all business remotely. B) b) Implementing a series of increasingly restrictive security measures, starting with a welcoming public lobby and progressing to controlled access points for sensitive areas, utilizing technology like biometrics and smart cards C) a) Creating a fortress-like structure with minimal windows and a single, heavily guarded entrance. D) c) Relying solely on a highly trained security force to patrol the building and monitor visitor access.
A) d) A decline in community engagement and social cohesion. B) c) Over-policing and discriminatory practices in marginalized communities. C) b) An increase in serious crime rates. D) a) A decrease in property values in low-income neighborhoods
A) b) Displaying artifacts in glass cases with basic alarms and relying on security guards to monitor the exhibits B) c) Utilizing a combination of reinforced display cases with advanced sensors, layered access control systems, real-time video analytics, and strategically placed architectural barriers to deter and detect potential threats. C) a) Storing all artifacts in a single, highly secure vault with limited access. D) d) Purchasing insurance policies to cover the potential loss of artifacts
A) a) Installing surveillance cameras on every street corner B) d) Separating residential areas from commercial zones to educe crime. C) b) Encouraging a vibrant mix of land uses and pedestrian activity to create a safer and more engaging public realm D) c) Implementing strict curfews and loitering laws |