A) To prevent unauthorized entry and removal of items B) To create mechanical resistance C) To generate electrical signals D) To store digital combinations
A) It uses electromagnetic force B) It requires a digital code C) It’s permanently attached D) It’s portable and detachable with a sliding hasp
A) A lock installation tool B) A lock picker C) A security system designed D) A type of key manufacturer
A) With digital combinations B) Using physical obstructions to block incorrect keys C) Through biometric scanning D) Through electromagnetic pulses
A) They use mechanical tumblers B) They require physical keys C) They record usage time and user identity D) They operate solely on battery power
A) Using electromagnetic force and an armature plate B) Through digital keypads only C) Through mechanical pins D) With rotating discs
A) Through mechanical key insertion B) Through radio frequency identification C) Using a sequence of numbers in proper order D) By scanning fingerprints
A) A grand master key only works on specific floors B) A grand master key opens all in the building C) A master key works only in emergency situations D) A master key opens all locks in the building
A) To hold only duplicate keys B) To keep employee records C) To store original keys for all locks in the system D) To store maintenance supplies
A) Only lost key incidents B) Reports from the person responsible for key control in personnel C) Report from the security department D) Only master key assignments
A) A vault is portable while a safe is fixed B) They serve exactly the same purpose C) A vault is part of the building structure and more heavily constructed D) A safe is larger than a vault
A) Weekly audits only B) Annual inventory checks C) Only tracking master key D) Recording lock code numbers and key assignments
A) On a fixed monthly schedule B) Only when key are lost C) Unannounced and by management D) Only during annual reviews
A) Weekly safe inspections B) Annual checks only C) Periodic accounting of all keys issued to employees D) Daily counts of master keys
A) Because it involves physical infrastructure B) Because it involves technological assets C) Because it involves financial resources D) Because it involves people both as assets and potential threats
A) Serving as a screening device in hiring B) Developing security awareness among employees C) Providing background investigation services D) Managing building access control systems
A) Storage and Retrieval B) Transfer C) Classification D) Creation
A) Secret B) Restricted C) Top secret D) Confidential
A) Class IV-Non-essential Documents B) Class I-Vital Documents C) Class III-Useful Documents D) Class II-Important Documents
A) Information is expansive B) Information is voluminous C) Information requires barriers D) Information is costly
A) A system of trafficking employee attendance B) A process of monitoring employee computer usage C) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty D) A method of evaluating employee performance
A) Foreign travel history B) Employment history C) Criminal record D) Social media passwords
A) To conduct random drug testing B) To monitor employee internet usage C) To inspect with careful thoroughness through personal interviews under stress D) To verify employment references
A) Exit interview B) Financial inquiry C) Undercover investigation D) Positive vetting
A) Personnel are the weakest link in the security chain B) Training makes security personnel conscious C) Security systems are more important than personnel training D) Training is necessary for the practice of NEED TO KNOW principle
A) Top secret B) Restricted C) Secret D) Private
A) Red B) Green C) Blue D) White
A) Information is expansive B) Information has a limited life C) Information is costly D) Information requires barriers
A) Financial awareness B) Development among employees C) Technical awareness D) Employee development
A) Legal prosecution B) Public disclosure C) Immediate termination D) Protection against unfounded claims
A) By conducting performance reviews B) By managing payroll C) By focusing on technical skills only D) By serving as a screening device
A) Speed of hiring B) Need for establishment C) Cost effectiveness D) Automation of process
A) During refresher conferences B) During the exit interview C) During orientation and training D) During security promotions
A) PNP Directorate for intelligence B) Barangay clearance C) ISAFP clearance D) NBI clearance
A) To issue final paycheck B) To give departing employees an opportunity to list grievances C) To conduct final performance evaluation D) To collect company property
A) Predicting subject’s reactions in future critical situations through behavior observation B) Physical surveillance of employees C) Random security checks of employee workstations D) Monitoring of employee communications
A) To reduce storage costs B) To simplify document sharing C) To increase office efficiency D) To deter and impede potential spies
A) Original literary and musical work B) Customer database only C) Manufacturing processes only D) Business methods only
A) Personnel security B) Physical security C) Technological security D) Information security
A) It requires less oversight B) It requires the most financial investment C) It is easier to implement than other security measures D) It involves protecting both assets and managing human threats
A) Doctrina-teaching method B) Documenta-written proof C) Docere-to show D) Documentum-teaching or lesson
A) Green B) White C) Red D) Blue
A) Documents that are irreplaceable and critical for recovery B) Documents that are routine in nature C) Documents that are replaceable with some effort D) Documents that cause minor inconvenience if lost
A) Restricted B) Private C) Secret D) Top secret E) Confidential
A) Time management issues B) Only external threats C) Theft and sabotage D) Attendance problems
A) Technological approach B) Financial approach C) Comprehensive approach to protection and screening D) Reactive approach only
A) Natural disasters B) External theft C) Employee negligence or participation in theft D) Technology failures
A) Hiring suitable employees B) Monitoring computer systems C) Providing security to employees D) Supporting employee functions
A) 4 B) 5 C) 6 D) 2 E) 3
A) Security education B) Financial auditing C) Emergency response D) Physical barriers
A) Confidential B) Top secret C) Restricted D) Secret
A) Class IV-Non-essential documents B) Class I-Vital documents C) Class III-useful documents D) Class II-important documents
A) 7 B) 8 C) 6 D) 4 E) 5
A) Barangay clearance B) NBI clearance C) Court clearance D) Municipal clearance
A) To check criminal records B) To predict future reactions C) To verify past employment D) To conduct surveillance
A) Market research investigation only B) Criminal investigation only C) Competitor analysis D) Background investigation of potential and current employees
A) Manages employee benefits B) Provide physical protection only C) Offers financial protection D) Protects against unfounded allegations and discrimination
A) Technical skills B) Security awareness C) Management training D) Career development
A) A government-issued patent B) A copyright protection C) A secret formula D) Words or symbols used to differentiate goods
A) Trade secret B) Trademark C) Copyrights D) Patents
A) Piracy B) Misappropriation C) Counterfeiting D) Infringement
A) Top secret B) Confidential C) Secret D) Restricted
A) Positive vetting B) Financial and lifestyle inquiry C) Undercover investigation D) Background investigation
A) Direct questioning B) Concealed identity C) Open surveillance D) Public monitoring
A) Court clearance B) NBI clearance C) ISAFP clearance D) Local clearance
A) To terminate employment B) To issue clearances C) To discover unknown problems D) To process final payments
A) Investigates competitor activities B) Investigates market conditions C) Investigates employees suspected of wrongdoing D) Investigates only external threats
A) Customer screening B) Medical screening C) Drug testing only D) Employee hiring screening
A) To manage inventory B) To maximize profits C) To handle public relations D) To ensure suitable hiring and protect employees
A) Maps and overlays B) Orders and manual C) Letters and diaries D) Official records
A) Class III B) Class I C) Class II D) Class IV
A) They can cause inconvenience but are replaceable B) They are critical for business recovery C) They are irreplaceable D) They require extensive protection
A) Professional security integration B) Personnel security investigation C) Personal safety instruction D) Physical security implementation
A) Entry-level positions B) Technical positions C) Sensitive positions D) Management positions
A) Discretion B) Loyalty C) Morals D) Technical skills
A) To verify documents B) To evaluate work performance C) To assess truthfulness during interviews D) To check financial records
A) Technical competency B) Management skills C) National security suitability D) Physical fitness
A) 1,500 professional B) 2,000 professionals C) 2,500 professional D) 3,000 professional
A) 25 years old B) 33 years old C) 30 years old D) 21 years old E) 23 years old
A) The Philippine National Police B) The department of education C) The national bureau of investigation D) The supervisory office for security and investigation Agency
A) Government intelligence work B) Public law enforcement C) Military operations D) K9 security services
A) June 30,2021 B) July 30 ,2022 C) August 30,2022 D) July 30,2022
A) Must have a college degree B) Must be of lager age C) Must be Filipino citizen D) Must be physically and mentally fit
A) Background investigation B) Prowling C) Exit interview D) Positive vetting
A) Financial stability B) Educational background C) Work experience D) Career progression
A) Prowling B) Undercover investigation C) Background investigation D) Positive vetting
A) Barangay office B) Municipal office C) PNP Directorate for intelligence D) Local court
A) Only physical fitness tests B) Only neuro -psychiatric C) Both neuro-psychiatric and drug test plus physical and mental fitness D) Only drug test
A) The Department of justice B) The bureau of internal security C) The chief of the philippine National Police or authorities representative D) The secretary of interior
A) Confidential B) Secret C) Wtf D) Private E) Restricted |