ThatQuiz Test Library Take this test now
JULIET 2- LEA 3
Contributed by: Gentalian
  • 1. A private security agency implements cost-cutting by assigning one guard to
    monitor three different posts simultaneously. Under RA 11917, this practice primarily
    violates which principle of professional management?
A) A. Optimization of manpower
B) B. Standardization of post duties
C) D. Rotation of personnel
D) C. Compliance to service contract obligations
  • 2. 2. RA 11917 redefines the role of security managers as strategic partners in national
    safety. Which of the following best reflects that shift?
A) C. A manager focuses on surveillance only
B) D. A manager limits guard functions to access control
C) B. A manager integrates security protocols with disaster preparedness plans
D) A. A manager assigns guards based on seniority
  • 3. If a company’s security director adopts RA 11917’s principle of “professionalization,” the closest analogy is:
A) C. A clerk following old company rules
B) D. A farmer changing planting schedules
C) A. A doctor maintaining continuous medical education
D) B. A mechanic adjusting tools for faster repair
  • 4. The essence of RA 11917 can be best evaluated as:
A) A. Promoting security as mere enforcement
B) D. Encouraging more commercial licenses
C) B. Elevating security management to a recognized profession
D) C. Restricting entry into the field of private protection
  • 5. RA 11917 directs that private security managers shall undergo continuous
    competency development. Which practice contradicts this policy
A) C. Renewal of license without retraining
B) B. Seminar on modern threat response
C) D. Participation in PNP-SOSIA certification
D) A. Annual re-training of guards
  • 6. A security agency continues to deploy unlicensed guards, claiming they are
    “trainees.” From the perspective of RA 11917, what principle is violated?
A) A. Professional regulation and accountability
B) C. Managerial discretion in deployment
C) B. Operational flexibility of agencies
D) D. Training exemption clause
  • 7. If RA 11917 aims to elevate security services into a profession, which of the
    following actions by a company best fulfills that legislative intent?
A) A. Reducing the guard-to-client ratio
B) C. Outsourcing background checks
C) B. Implementing continuing professional development and ethics training
D) D. Limiting the scope of internal audits
  • 8. In the analogy of law to practice, RA 11917 is to private security as:
A) A. The Labor Code is to employment
B) C. The Penal Code is to punishment
C) D. The NBI Charter is to investigation
D) B. The Civil Code is to property
  • 9. A manager insists that “experience outweighs licensing” when hiring guards. As a
    consultant, what evaluation should you make under RA 11917?
A) D. It reduces administrative load
B) C. It promotes efficient manpower use
C) A. It violates regulatory competence standards
D) B. It aligns with practical field operations
  • 10. If RA 11917 serves as a quality benchmark for the private security profession, which of the following outcomes would best indicate compliance?
A) D. Decrease in security awareness training
B) B. Consistent adherence to competency-based performance standards
C) C. Increase in unregistered security firms
D) A. Reduced turnover due to higher wages
  • 11. . RA No. 11917 modernizes the private security industry by emphasizing
    professionalism. If a security agency fails to comply with the competency standards, what principle of professional practice is most compromised?
A) B. Ethical accountability
B) A. Efficiency in operations
C) C. Institutional autonomy
D) D. Corporate sustainability
  • 12. A security manager insists on employing unlicensed guards due to labor
    shortages. Under RA No. 11917, this reflects a violation of which managerial
    responsibility?
A) B. Regulatory compliance in operational management
B) A. Delegation of authority
C) D. Administrative discretion
D) C. Fiscal accountability
  • 13. RA No. 11917 aims to strengthen the link between the private security sector and
    national peacekeeping functions. This is most analogous to:
A) D. A corporate lawyer bound by IBP ethics
B) A. A private nurse working under DOH regulation
C) B. A barangay tanod acting as a police auxiliary
D) C. A private bank following BSP risk assessment
  • 14. A chief security officer integrates RA 11917 principles into staff evaluation. The
    most outcome-based measure of compliance would be:
A) B. The consistency of security actions with ethical standards
B) C. The ratio of guards to clients
C) D. The frequency of policy updates
D) A. The number of personnel trained annually
  • 15. RA No. 11917 professionalizes the security industry. Which scenario best
    illustrates its intended operational effect?
A) A. Security firms competing for higher pay rates
B) B. Guards exercising discretion guided by legal standards
C) C. Managers outsourcing training programs
D) D. Agencies avoiding government audits
  • 16. RA 11917 addresses the need for professionals to adhere to a code of ethics. What is the primary purpose of this code?
A) b) To provide guidelines for professional conduct and integrity
B) c) To limit the number of professionals in a specific field
C) d) To promote competition among professionals
D) a) To ensure professionals earn a high income
  • 17. Under RA 11917, what is the role of the Professional Regulation Commission
    (PRC) in relation to the PRBs?
A) b) To provide funding for the PRBs
B) d) To ignore the PRBs
C) c) To compete with the PRBs
D) a) To supervise and control the PRBs
  • 18. RA 11917 aims to enhance the competence of professionals. Which of the
    following is NOT a strategy employed to achieve this goal?
A) c) Encouraging research and innovation in professional fields
B) d) Guaranteeing employment for all professionals
C) a) Implementing rigorous licensure examinations
D) b) Mandating Continuing Professional Development (CPD)
  • 19. According to RA 11917, what is the significance of having updated and relevant
    professional standards?
A) a) To make it easier for professionals to find jobs
B) b) To ensure professionals meet global benchmarks and can compete internationally
C) d) To limit the scope of practice for professionals
D) c) To reduce the cost of professional services
  • 20. In the context of RA 11917, what is the potential impact of effective regulation
    and management of professions on the general public?
A) a) Increased taxes for the public
B) c) Enhanced quality and safety of professional services
C) d) Reduced access to professional services
D) b) Higher prices for professional services
  • 21. A security agency continues operations despite license expiration. Under RA
    11917, which principle of professional practice is being violated?
A) B. Administrative coordination
B) A. Regulatory compliance
C) D. Operational discretion
D) C. Ethical governance
  • 22. RA 11917 emphasizes the “professionalization” of private security. This primarily
    aims to:
A) A. Reduce the cost of agency operations
B) B. Ensure standardized training and accountability
C) C. Expand the jurisdiction of the PNP
D) D. Allow private security to act as quasi-police forces
  • 23. A company insists on hiring unlicensed guards to cut costs. From a management
    ethics perspective under RA 11917, the security manager should:
A) A. Report the company to DTI
B) D. Wait for formal complaint before acting
C) B. Refuse compliance and justify business necessity
D) C. Uphold the law despite business pressure
  • 24. The creation of a Comprehensive Training Curriculum under RA 11917 supports
    which management principle?
A) C. Profit-driven motivation
B) B. Integration of competence and accountability
C) D. Centralized command approach
D) A. Efficiency over legality
  • 25. When a security director designs a corporate policy consistent with RA 11917,
    the act is a demonstration of:
A) D. Administrative hierarchy
B) C. Professional autonomy and responsibility
C) A. Ethical minimalism
D) B. Managerial compliance
  • 26. Which situation best demonstrates the application of customer relations training
    for security professionals?
A) C. A guard detains a customer for minor inconvenience
B) D. A guard prioritizes rules over empathy
C) B. A guard de-escalates a confrontation through calm communication
D) A. A guard ignores customer concerns to maintain discipline
  • 27. 27. Corporate intelligence differs from investigation in that it:
A) B. Aims to anticipate threats for decision-making
B) A. Focuses on criminal liability
C) D. Deals only with insider theft
D) C. Involves court procedures
  • 28. When a guard performs a fire drill with customers present, it shows:
A) B. Coordination of customer relations with safety protoco
B) D. Failure of situational awareness
C) C. Overstepping of duties
D) A. Violation of safety ethics
  • 29. In customer interaction, the primary skill that reflects professionalism is:
A) A. Assertive body language
B) C. Verbal dominance
C) B. Emotional intelligence and restraint
D) D. Physical authority
  • 30. Corporate intelligence supports security management by:
A) B. Predicting business risks through information synthesis
B) D. Collecting data without analysis
C) C. Focusing on post-crime reporting
D) A. Detecting minor violations
  • 31. During a crowd-control operation, a client becomes verbally aggressive toward a
    security guard demanding immediate access. The guard maintains composure, uses
    active listening, and calmly explains entry procedures. This response best reflects
    which principle of professional conduct?
A) A. Command presence over customers
B) C. Strict enforcement without compromise
C) D. Defensive compliance to avoid escalation
D) B. Customer-centred communication and conflict de-escalation
  • 32. A guard notices that fire exits are consistently blocked by store merchandise.
    Instead of filing a report, he verbally warns the store manager, who promises to “fix it
    later.” The guard’s decision primarily fails in which safety protocol area?
A) D. Emergency command protocol
B) C. Safety communication ethics
C) B. Preventive risk escalation
D) A. Reporting chain of command
  • 33. In analogy, “Professional courtesy is to customer relations” as “situational
    awareness is to ___
A) D. Administrative reporting
B) B. Operational discipline
C) C. Personal safety and incident prevention
D) A. Uniform compliance
  • 34. During a building evacuation drill, a guard prioritizes escorting VIP tenants first, delaying assistance to elderly occupants. In evaluating his decision based on safety
    hierarchy, what is the most accurate analysis?
A) A. Acceptable prioritization since VIPs are high-value clients
B) B. Violates impartiality and universal duty of care in emergency protocol
C) D. Proper since client satisfaction is primary in service delivery
D) C. Logistically correct because VIPs move faster and clear exits sooner
  • 35. A security supervisor introduces a new standard greeting procedure aimed at
    improving customer rapport. After implementation, customer complaints about
    rudeness decrease, but response time to incidents slightly increases. From a
    management evaluation perspective, what is the most balanced action?
A) C. Reassess workflow to integrate courtesy without compromising readiness
B) D. Enforce stricter penalties for slow response times
C) B. Continue the policy without modification
D) A. Discontinue the new greeting to restore speed
  • 36. Scenario: A company's security team is receiving numerous complaints about
    their handling of customer inquiries, often perceived as dismissive and unhelpful. What is the MOST effective long-term solution to address this issue?
A) c) Integrate comprehensive customer service training, including active listening and empathy, into the security team's ongoing professional development.
B) b) Implement a zero-tolerance policy for complaints against security personne
C) d) Reduce the security team's interaction with customers to minimize potential conflicts
D) a) Replace the entire security team with personnel from a customer service background.
  • 37. Analogy: A company's security and safety protocols are to its operations as ___
    is to a human body
A) d) A comfortable chair
B) b) A balanced diet and regular exercise.
C) c) A first-aid kit.
D) a) A stylish outfit.
  • 38. Analysis: During a corporate investigation into a potential data breach, it is
    discovered that several employees routinely bypass security protocols for the sake of
    convenience. Which approach would BEST balance the need for security with
    employee productivity?
A) a) Immediately terminate all employees who bypassed security protocols.
B) c) Conduct a thorough review of existing security protocols, identify areas of unnecessary friction, and implement user-friendly alternatives while reinforcing security awareness training.
C) b) Ignore the breaches to avoid disrupting employee morale and productivity.
D) d) Implement stricter, more complex security protocols to deter future breaches, regardless of the impact on productivity
  • 39. Evaluation: Which of the following Key Performance Indicators (KPIs) would
    provide the MOST comprehensive assessment of a company's overall security
    effectiveness?
A) a) The number of security drills conducted per year.
B) d) The number of security certifications held by security personnel.
C) c) A combination of reduced security incidents, improved employee awareness scores, and positive customer feedback on security interactions
D) b) The amount of money spent on security technology and personnel
  • 40. Application: While monitoring surveillance footage, you observe an individual
    attempting to access a restricted area using a keycard that does not appear to
    belong to them. What is the MOST appropriate immediate action?
A) a) Immediately alert all security personnel and initiate a lockdown of the facility
B) d) Publicly confront the individual and demand an explanation in front of other employees and visitors.
C) b) Ignore the situation unless the individual successfully gains access to the restricted area.
D) c) Discreetly approach the individual, politely inquire about their identity and purpose, and verify the validity of the keycard
  • 41. A guard mishandles a customer complaint, causing reputational damage. Which
    security training dimension was most deficient?
A) D. Firearms proficiency
B) A. Customer relations and crisis communication
C) B. Surveillance techniques
D) C. Legal procedures
  • 42. In an incident review, investigators found that guards failed to coordinate
    information on suspicious individuals. What corporate intelligence weakness does
    this reflect?
A) B. Excessive procedural compliance
B) D. Lack of physical deterrence
C) C. Overreliance on electronic systems
D) A. Poor information integration
  • 43. .In an analogy, “Security training” is to “prevention” as “investigation” is to ______.
A) A. detection
B) D. cooperation
C) B. discipline
D) C. deterrence
  • 44. If you were to evaluate a company’s safety protocol, what metric best measures
    its effectiveness?
A) B. Number of employees trained
B) D. Cost of materials used
C) A. Reduction in incident recurrence after implementation
D) C. Frequency of drills
  • 45. A hotel’s security team excels in intelligence gathering but fails in guest
    satisfaction. What recommendation reflects higher-order thinking?
A) D. Focus solely on surveillance hardware
B) A. Integrate human relations training with corporate intelligence modules
C) C. Isolate intelligence from guest operations
D) B. Replace personnel with IT-based monitoring
  • 46. (Situational Analysis – Application of Security Protocols) A private security officer
    assigned to a corporate lobby observes a visitor insisting on bypassing the logbook
    because he is a “frequent VIP guest.” The officer politely insists on the security
    protocol, but the visitor becomes irate. As a trained professional, which of the
    following actions best demonstrates the correct balance of security discipline and
    customer relations
A) A. Allow entry to avoid conflict, since the visitor claims VIP status.
B) B. Call for backup immediately and confront the visitor in a firm tone
C) C. Maintain composure, explain the protocol’s importance in a respectful manner, and discreetly verify with superiors if exceptions apply.
D) D. Deny entry outright and warn the visitor that noncompliance is a violation
  • 47. (Evaluation – Corporate Intelligence Integration) During an internal investigation, a corporate security officer learns of a potential data leak from an employee who
    frequently accesses sensitive files outside work hours. From a corporate intelligence
    perspective, which initial approach best upholds both investigative integrity and
    organizational ethics?
A) C. Immediately suspend the employee pending investigation.
B) D. Ignore the activity until concrete proof of data theft is found.
C) B. Conduct discreet surveillance and document patterns before informing management
D) A. Publicly confront the employee to make an example for others.
  • 48. (Analogy – Coordination and Crisis Management) Customer Relations is to trust- building, as Security Protocol Compliance is to ________.
A) D. Conflict prevention
B) A. Convenience of service
C) C. Corporate flexibility
D) B. Operational discipline
  • 49. (Analytical – Risk Management in Operations) A company implements an
    emergency evacuation drill. During the drill, some employees refuse to participate, considering it “a waste of time.” If you were the head of corporate security, how
    should you evaluate and act in this situation to enhance safety culture?
A) C. Conduct a debriefing to identify behavioral gaps and emphasize real-world implications of non-compliance.
B) D. Repeat the drill without feedback to ensure familiarity
C) A. Penalize all non-participants immediately
D) B. Submit a report and recommend termination for those who disobey.
  • 50. . (Evaluation/Policy Judgment – Investigation Ethics) An internal investigator
    gathers confidential information by accessing private emails without authorization, arguing it was “for company protection.” How should this action be evaluated under
    professional investigation ethics?
A) C. Unethical because it violates privacy rights and due process, regardless of motive.
B) B. Acceptable if done discreetly.
C) A. Acceptable if it prevents corporate loss.
D) D. Justifiable only if ordered by management.
  • 51. (Analytical – Security Survey Integration) A multinational company is planning to
    relocate its operations to a new city. The management requests a comprehensive
    security survey before the move. As the chief security consultant, which of the
    following actions best demonstrates the proper sequencing and analytical use of a
    security survey?
A) A. Conduct risk assessment only after incidents occur
B) C. Interview employees first, then design new policies without physical inspection.
C) D. Draft security protocols immediately without environmental scanning.
D) B. Begin with site observation, followed by data gathering, risk identification, and recommendation of layered security measures.
  • 52. (Evaluation – Personnel and Physical Security Application) During a night
    inspection, a security manager notices that several guards in a high-value
    warehouse rely solely on CCTV monitoring and do not perform physical patrols. From a risk management perspective, which assessment is most accurate?
A) C. Efficient because it saves manpower resources.
B) A. Acceptable since technology can replace manpower
C) B. Risky because technological reliance reduces deterrence and real-time response
D) D. Permissible if incidents are infrequent.
  • 53. (Analogy – Risk Control Logic) Security Survey is to identifying vulnerabilities, as
    Risk Management is to ________.
A) A. Responding to emergencies
B) D. Recruiting qualified guards
C) C. Recording all incidents
D) B. Controlling and mitigating identified threats
  • 54. (Applied Evaluation – Document and Information Security) A confidential report on
    internal investigations was leaked online. Initial inquiry shows that the file was
    accessed through an unsecured personal email of a company officer. In terms of
    document and information security policy, what is the most appropriate
    organizational response?
A) D. Increase surveillance on all staff computers without consent.
B) B. Dismiss the employee immediately to set an example.
C) C. Restrict all email communications without policy review.
D) A. Strengthen digital access control and implement strict data classification protocols.
  • 55. (Evaluation/Strategic Judgment – Business Continuity Management Plan) After a
    fire incident, a company’s headquarters is rendered unusable. However, operations
    resume within 48 hours through remote setups and temporary satellite offices. What
    aspect of the Business Continuity Management Plan (BCMP) was most effectively
    demonstrated?
A) C. Strategic redundancy and recovery implementation
B) B. Facility evacuation procedures
C) A. Emergency response readiness
D) D. Insurance claim processing
  • 56. A company conducts a risk assessment identifying data theft as a primary threat. The next logical step under business continuity planning is:
A) B. Developing an incident response plan
B) C. Installing more lighting
C) D. Conducting employee drills
D) A. Hiring additional guards
  • 57. . If physical security protects tangible assets, information security protects
    intangible ones. By analogy, personnel security protects:
A) C. Firewalls and passwords
B) A. Access credentials
C) D. Corporate image
D) B. Trust and reliability
  • 58. A comprehensive security plan must be:
A) D. Defensive and passive
B) C. Procedural and limited
C) A. Reactive and segment
D) B. Proactive and integrative
  • 59. When a risk manager prioritizes threats based on probability and impact, he is
    primarily applying the principle of:
A) D. Loss estimation
B) B. Risk quantification
C) A. Security audit
D) C. Threat profiling
  • 60. The relationship between risk management and business continuity is most like:
A) D. Fire and extinguisher
B) A. Lock and key
C) C. Plan and rehearsal
D) B. Cause and effect
  • 61. A company’s risk management plan identified threats but failed during an actual
    cyberattack. What analytical weakness occurred?
A) C. Too much documentation
B) B. Excessive focus on fire safety
C) A. Lack of dynamic threat simulation
D) D. Overdelegation of duties
  • 62. If physical security is to perimeter protection, what is document security to?
A) C. Asset visibility
B) B. Access control
C) D. Guard rotation
D) A. Data confidentiality
  • 63. Which scenario best demonstrates integration of Business Continuity
    Management (BCM) principles?
A) B. Immediate employee retraining
B) A. Rapid operational recovery despite facility damage
C) D. Hiring external auditors post-crisis
D) C. Acquisition of insurance policy only
  • 64. When conducting a security survey, what step shows the highest analytical
    competence?
A) C. Interviewing random employees only
B) A. Linking identified vulnerabilities with risk probability and consequence
C) D. Writing a generic safety report
D) B. Listing all available equipment
  • 65. .In evaluating risk mitigation strategies, which factor should dominate decision- making?
A) A. Cost-benefit ratio versus threat likelihood
B) D. Legal documentation alone
C) C. Client demand
D) B. Supervisor preference
  • 66. Scenario: A company is relocating its headquarters to a new building. As the
    security consultant, you are tasked with conducting a security survey. Which of the
    following actions should be your FIRST priority?
A) d) Interviewing all employees to gather their security concerns.
B) c) Assessing the external threats and vulnerabilities of the new location.
C) b) Reviewing the company’s existing security policies and procedures.
D) a) Installing the latest security technology.
  • 67. Analogy: A Business Continuity Management Plan (BCMP) is to a company as ___ is to a ship during a storm.
A) b) A detailed passenger manifest.
B) a) A fresh coat of paint.
C) d) A fully stocked galley.
D) c) A well-trained crew following emergency protocols
  • 68. A company experiences a data breach that compromises sensitive
    customer information. Upon investigation, it is discovered that the company's
    document and information security protocols were inadequate. Which of the following
    actions would BEST address this vulnerability and prevent future incidents?
A) a) Increase the budget for cybersecurity software.
B) d) Hire more IT personnel to monitor network traffic
C) c) Conduct a comprehensive risk assessment, update document and information security protocols, and provide regular training to employees on data protection best practices.
D) b) Implement stricter penalties for employees who violate data security policies
  • 69. . Evaluation: Which of the following metrics would provide the MOST
    comprehensive assessment of the effectiveness of a company's physical security
    measures?
A) d) The amount of money spent on physical security equipment and personnel
B) c) A combination of reduced security incidents, successful perimeter breach attempts, and employee feedback on safety perceptions.
C) b) The number of security guards patrolling the facility.
D) a) The number of security cameras installed on the premises
  • 70. Application: During a personnel security screening, you discover that an
    applicant has misrepresented their employment history. What is the MOST
    appropriate initial action?
A) c) Conduct a thorough investigation to verify the accuracy of the applicant’s information and assess the potential risk to the organization.
B) d) Publicly confront the applicant and demand an explanation for the misrepresentation.
C) b) Ignore the discrepancy if the applicant is otherwise qualified
D) a) Immediately reject the applicant without further consideration.
  • 71. During a security survey of a financial institution, the surveyor notes that CCTV
    coverage is excellent, but access logs show frequent tailgating through controlled
    doors. What conclusion best reflects an analytical evaluation of the institution’s
    security posture?
A) B. Surveillance compensates for procedural lapses
B) D. The tailgating issue is minor since no breach has yet occurred.
C) C. The human element in access control weakens an otherwise strong system
D) A.Physical security measures are effective and sufficient.
  • 72. A security planner recommends reducing guard posts and replacing them with
    biometric access and alarm systems. From a management evaluation standpoint,
    this decision primarily tests the balance between:
A) C. Budget allocation versus client perception
B) D. Legal compliance versus administrative convenience
C) A. Technology dependence versus manpower redundancy
D) B. Physical barrier design versus emergency evacuation speed
  • 73. . In analogy: “Personnel security screening is to loyalty assurance” as “document
    security control is to ____.”
A) D. Archival accessibility
B) C. Data digitization accuracy
C) A. Records retrieval efficiency
D) B. Confidentiality and integrity assurance
  • 74. . During an information security audit, the team discovers that confidential reports
    are being sent via unsecured email but only to trusted personnel. What is the best
    analytical judgment regarding this practice?
A) A. Acceptable since recipients are authorized
B) B. Violation of confidentiality principle due to insecure transmission medium
C) C. Efficient communication outweighs minor risk
D) D. Minor issue if files are later deleted
  • 75. A corporate facility has strong physical barriers and strict personnel vetting, yet
    an internal data leak occurs through an employee’s USB device. What evaluation
    most accurately identifies the planning weakness?
A) B. Overemphasis on perimeter defense, neglecting information security policy
B) C. Ineffective background investigation
C) A. Failure of physical access control
D) D. Inadequate visitor management procedures
  • 76. Which of the following urban planning strategies most closely mirrors the principle
    of 'territorial reinforcement' in physical security design?
A) D. Promoting walkable streets to enhance community interaction
B) C. Zoning residential areas with clear boundaries and layered access control
C) A. Creating a centralized business district to encourage economic growth
D) B. Installing CCTV cameras at every street corner to reduce crime
  • 77. A newly built commercial complex features wide open spaces, minimal
    landscaping barriers, and large glass facades. Despite its aesthetic appeal, several
    theft incidents occur. From a Crime Prevention Through Environmental Design
    (CPTED) perspective, which design flaw most likely contributed to the breaches in
    security?
A) A. Absence of defensive architecture like bollards
B) B. Excessive transparency in façade design reducing perceived control
C) C. Overcrowding of retail shops limiting natural surveillance
D) D. The use of modern materials prone to forced entry
  • 78. In the context of philosophical foundations of security, which approach best
    justifies integrating urban greenspaces in high-risk urban areas?
A) A. Deontological – Urban greenery is a duty of the government regardless of outcomes
B) C. Virtue Ethics – Green areas reflect the moral character of urban developers
C) B. Utilitarian – Urban greenspaces reduce crime and promote overall public well- being
D) D. Social Contract – Citizens must follow rules set by planners who include greenspaces
  • 79. Which design intervention demonstrates the most effective convergence of urban
    planning and physical security to deter criminal behaviour without compromising
    public accessibility?
A) C. Mixed-use developments with passive surveillance and active frontage
B) D. Isolated parks with hidden CCTV systems
C) A. High steel perimeter fencing with monitored gates
D) B. Narrow alleyways with overhead motion sensors
  • 80. A security audit compares two residential developments: Development A uses
    gated entries, no public parks, and opaque perimeter walls. Development B uses
    open fencing, public walkways, and strategically placed community amenities. Which
    conclusion is most accurate based on modern security design principles?
A) B. Development B poses higher security risk due to permeability and openness
B) D. Development A exemplifies CPTED by reducing opportunities for observation by outsiders.
C) A. Development A is more secure due to limited access and high boundary protection.
D) C. Development B fosters natural surveillance and community ownership, making it more resilient.
  • 81. . (Analytical – Theory Application to Urban Design) An urban planner proposes
    building a new commercial center surrounded by narrow streets and poorly lit alleys
    to maximize land use. As a security consultant applying Crime Prevention Through
    Environmental Design (CPTED) principles, what is the best evaluation of this plan?
A) B. It violates basic environmental design principles by increasing opportunities for concealment and crime.
B) C. It aligns with traditional architectural philosophy.
C) D. It can be justified if CCTV coverage is installed
D) A. It optimizes business space and should proceed.
  • 82. . (Evaluation – Integration of Safety Philosophy and Architecture) A corporate
    headquarters emphasizes aesthetic glass facades but neglects blast resistance and
    fire escape design. From a philosophical and theoretical standpoint of architectural
    security, what should be the guiding principle for critique?
A) A. Form should always follow aesthetics.
B) C. Security can be an afterthought once design is complete.
C) B. Function and resilience must harmonize with design — security and safety are integral, not decorative
D) D. Architects are solely responsible for aesthetic integrity, not safety measures.
  • 83. . (Analogy – Conceptual Reasoning) CPTED is to crime deterrence through
    environmental design, as Defensible Space Theory is to ________.
A) B. Empowering occupants to control territorial space
B) D. Reducing architectural costs
C) A. Enforcement of zoning laws
D) C. Relying on mechanical security systems
  • 84. . (Evaluative – Urban Planning and Security Sustainability) A new smart city project
    heavily relies on digital surveillance and automated access control. However, physical barriers, community watch programs, and spatial zoning are poorly
    integrated. Which critique best reflects balanced philosophical application of urban
    security principles?
A) C. Automation guarantees total safety
B) D. Community programs are outdated in modern cities
C) A. Security should rely solely on advanced technology.
D) B. Overreliance on surveillance undermines human-centered, layered defense principles
  • 85. . (Synthesis – Relational Judgment Across Disciplines) In the philosophy of safety
    and security management, physical design, policy enforcement, and human behavior
    interact dynamically. Which statement best reflects a professional’s role in
    harmonizing these three elements?
A) B. Human behavior is unpredictable, so only technology ensures safety.
B) A. Security policies should adapt to physical limitations.
C) C. Effective safety is achieved when design minimizes human error and supports policy compliance.
D) D. Architectural design has no ethical impact on security management.
  • 86. A building’s emergency exits are strategically positioned based on human
    movement patterns. This reflects which philosophy?
A) A. Psychological deterrence
B) B. Crime prevention through environmental design (CPTED)
C) D. Passive surveillance
D) C. Reactive defense
  • 87. If architecture shapes behaviour, then security design shapes:
A) B. Efficiency
B) A. Comfort
C) C. Discipline
D) D. Safety
  • 88. A designer integrates open spaces and visibility in a mall layout to minimize
    crime. This is an example of:
A) C. Natural surveillance
B) C. Natural surveillance
C) B. Target hardening
D) A. Human factor engineering
  • 89. The integration of lighting, landscaping, and access control in urban planning
    aligns with which theoretical framework?
A) D. Social Learning Theory
B) C. Broken Windows Theory
C) A. Rational Choice Theory
D) B. Environmental Criminology
  • 90. Evaluating architectural security is similar to:
A) B. Assessing how structure supports prevention
B) D. Measuring employee satisfaction
C) A. Checking building aesthetics
D) C. Estimating construction cost
  • 91. When an office is designed with open spaces and visible entrances to deter theft, what CPTED principle is applied?
A) A. Target Hardening
B) C. Natural Surveillance
C) D. Territorial Reinforcement
D) B. Defensible Space
  • 92. Installing ID access systems in restricted areas primarily demonstrates which
    concept?
A) B. Access Control
B) C. Human-Centered Design
C) D. Symbolic Security
D) A. Environmental Aesthetics
  • 93. When a public plaza integrates lighting and landscaping to promote visibility, this
    reflects:
A) C. Defensible Space
B) D. Security Zoning
C) B. Natural Surveillance
D) A. Territoriality
  • 94. The use of artistic fencing around a government facility balances security and
    aesthetics. This aligns with:
A) C. Environmental Deterrence
B) D. Situational Hardening
C) B. Symbolic Architecture
D) A. Human-Centered Security Design
  • 95. . A private building modifies its structure to eliminate blind corners. Which theory
    supports this?
A) C. Broken Windows Theory
B) D. Rational Choice Theory
C) A. CPTED
D) B. Routine Activity Theory
  • 96. A city planner is tasked with revitalizing a high-crime public park. Applying the
    principles of "Defensible Space" and CPTED, which of the following integrated
    strategies would be MOST effective in creating a safer environment?
A) a) Installing high fences around the park and limiting access to daylight hours.
B) b) Increasing police patrols and installing surveillance cameras throughout the park.
C) d) Redesigning the park to include clear sightlines, well-maintained landscaping, community gardens, and designated activity areas to encourage legitimate use and natural surveillance.
D) c) Removing all vegetation to eliminate hiding places and installing bright, glaring lights.
  • 97. An architect is designing a new corporate headquarters with a focus on layered
    security. Which of the following approaches BEST balances security concerns with
    the need for an accessible and welcoming environment?
A) d) Eliminating all public access and conducting all business remotely.
B) b) Implementing a series of increasingly restrictive security measures, starting with a welcoming public lobby and progressing to controlled access points for sensitive areas, utilizing technology like biometrics and smart cards
C) a) Creating a fortress-like structure with minimal windows and a single, heavily guarded entrance.
D) c) Relying solely on a highly trained security force to patrol the building and monitor visitor access.
  • 98. The "Broken Windows" theory has been criticized for potentially leading to:
A) d) A decline in community engagement and social cohesion.
B) c) Over-policing and discriminatory practices in marginalized communities.
C) b) An increase in serious crime rates.
D) a) A decrease in property values in low-income neighborhoods
  • 99. A security consultant is advising a museum on protecting its valuable artifacts. Which of the following strategies BEST integrates architectural design with advanced
    security technology to create a robust defense against theft?
A) b) Displaying artifacts in glass cases with basic alarms and relying on security guards to monitor the exhibits
B) c) Utilizing a combination of reinforced display cases with advanced sensors, layered access control systems, real-time video analytics, and strategically placed architectural barriers to deter and detect potential threats.
C) a) Storing all artifacts in a single, highly secure vault with limited access.
D) d) Purchasing insurance policies to cover the potential loss of artifacts
  • 100. In the context of urban planning, the concept of "eyes on the street," popularized
    by Jane Jacobs, emphasizes the importance of:
A) a) Installing surveillance cameras on every street corner
B) d) Separating residential areas from commercial zones to educe crime.
C) b) Encouraging a vibrant mix of land uses and pedestrian activity to create a safer and more engaging public realm
D) c) Implementing strict curfews and loitering laws
Created with That Quiz — where test making and test taking are made easy for math and other subject areas.