A) To create mechanical resistance B) To store digital combinations C) To prevent unauthorized entry and removal of items D) To generate electrical signals
A) It’s portable and detachable with a sliding hasp B) It requires a digital code C) It’s permanently attached D) It uses electromagnetic force
A) A security system designed B) A lock installation tool C) A lock picker D) A type of key manufacturer
A) Using physical obstructions to block incorrect keys B) Through biometric scanning C) With digital combinations D) Through electromagnetic pulses
A) They use mechanical tumblers B) They require physical keys C) They record usage time and user identity D) They operate solely on battery power
A) Through mechanical pins B) With rotating discs C) Through digital keypads only D) Using electromagnetic force and an armature plate
A) Using a sequence of numbers in proper order B) Through mechanical key insertion C) By scanning fingerprints D) Through radio frequency identification
A) A master key opens all locks in the building B) A grand master key opens all in the building C) A master key works only in emergency situations D) A grand master key only works on specific floors
A) To hold only duplicate keys B) To store original keys for all locks in the system C) To keep employee records D) To store maintenance supplies
A) Only lost key incidents B) Reports from the person responsible for key control in personnel C) Report from the security department D) Only master key assignments
A) A vault is part of the building structure and more heavily constructed B) A vault is portable while a safe is fixed C) A safe is larger than a vault D) They serve exactly the same purpose
A) Only tracking master key B) Recording lock code numbers and key assignments C) Weekly audits only D) Annual inventory checks
A) Unannounced and by management B) Only when key are lost C) On a fixed monthly schedule D) Only during annual reviews
A) Daily counts of master keys B) Annual checks only C) Periodic accounting of all keys issued to employees D) Weekly safe inspections
A) Because it involves financial resources B) Because it involves people both as assets and potential threats C) Because it involves technological assets D) Because it involves physical infrastructure
A) Developing security awareness among employees B) Managing building access control systems C) Providing background investigation services D) Serving as a screening device in hiring
A) Classification B) Transfer C) Creation D) Storage and Retrieval
A) Confidential B) Secret C) Top secret D) Restricted
A) Class II-Important Documents B) Class IV-Non-essential Documents C) Class I-Vital Documents D) Class III-Useful Documents
A) Information is voluminous B) Information is expansive C) Information is costly D) Information requires barriers
A) A system of trafficking employee attendance B) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty C) A process of monitoring employee computer usage D) A method of evaluating employee performance
A) Employment history B) Foreign travel history C) Criminal record D) Social media passwords
A) To conduct random drug testing B) To verify employment references C) To monitor employee internet usage D) To inspect with careful thoroughness through personal interviews under stress
A) Exit interview B) Financial inquiry C) Positive vetting D) Undercover investigation
A) Personnel are the weakest link in the security chain B) Security systems are more important than personnel training C) Training makes security personnel conscious D) Training is necessary for the practice of NEED TO KNOW principle
A) Private B) Secret C) Top secret D) Restricted
A) Red B) Blue C) Green D) White
A) Information is costly B) Information is expansive C) Information requires barriers D) Information has a limited life
A) Development among employees B) Technical awareness C) Employee development D) Financial awareness
A) Protection against unfounded claims B) Public disclosure C) Immediate termination D) Legal prosecution
A) By serving as a screening device B) By managing payroll C) By conducting performance reviews D) By focusing on technical skills only
A) Speed of hiring B) Automation of process C) Need for establishment D) Cost effectiveness
A) During refresher conferences B) During orientation and training C) During the exit interview D) During security promotions
A) PNP Directorate for intelligence B) ISAFP clearance C) NBI clearance D) Barangay clearance
A) To conduct final performance evaluation B) To give departing employees an opportunity to list grievances C) To issue final paycheck D) To collect company property
A) Monitoring of employee communications B) Predicting subject’s reactions in future critical situations through behavior observation C) Random security checks of employee workstations D) Physical surveillance of employees
A) To increase office efficiency B) To reduce storage costs C) To deter and impede potential spies D) To simplify document sharing
A) Manufacturing processes only B) Customer database only C) Business methods only D) Original literary and musical work
A) Personnel security B) Technological security C) Physical security D) Information security
A) It is easier to implement than other security measures B) It requires the most financial investment C) It requires less oversight D) It involves protecting both assets and managing human threats
A) Docere-to show B) Documenta-written proof C) Doctrina-teaching method D) Documentum-teaching or lesson
A) Red B) Green C) Blue D) White
A) Documents that are routine in nature B) Documents that are replaceable with some effort C) Documents that cause minor inconvenience if lost D) Documents that are irreplaceable and critical for recovery
A) Private B) Top secret C) Secret D) Restricted E) Confidential
A) Only external threats B) Theft and sabotage C) Time management issues D) Attendance problems
A) Comprehensive approach to protection and screening B) Reactive approach only C) Financial approach D) Technological approach
A) Employee negligence or participation in theft B) External theft C) Natural disasters D) Technology failures
A) Providing security to employees B) Hiring suitable employees C) Monitoring computer systems D) Supporting employee functions
A) 6 B) 3 C) 5 D) 4 E) 2
A) Security education B) Emergency response C) Physical barriers D) Financial auditing
A) Confidential B) Secret C) Top secret D) Restricted
A) Class IV-Non-essential documents B) Class II-important documents C) Class I-Vital documents D) Class III-useful documents
A) 4 B) 5 C) 6 D) 7 E) 8
A) Municipal clearance B) Barangay clearance C) Court clearance D) NBI clearance
A) To check criminal records B) To verify past employment C) To conduct surveillance D) To predict future reactions
A) Competitor analysis B) Market research investigation only C) Background investigation of potential and current employees D) Criminal investigation only
A) Offers financial protection B) Provide physical protection only C) Manages employee benefits D) Protects against unfounded allegations and discrimination
A) Security awareness B) Technical skills C) Career development D) Management training
A) A government-issued patent B) A copyright protection C) Words or symbols used to differentiate goods D) A secret formula
A) Trade secret B) Copyrights C) Patents D) Trademark
A) Misappropriation B) Piracy C) Infringement D) Counterfeiting
A) Secret B) Confidential C) Top secret D) Restricted
A) Undercover investigation B) Background investigation C) Positive vetting D) Financial and lifestyle inquiry
A) Public monitoring B) Direct questioning C) Concealed identity D) Open surveillance
A) NBI clearance B) Court clearance C) Local clearance D) ISAFP clearance
A) To terminate employment B) To discover unknown problems C) To issue clearances D) To process final payments
A) Investigates market conditions B) Investigates competitor activities C) Investigates only external threats D) Investigates employees suspected of wrongdoing
A) Drug testing only B) Customer screening C) Employee hiring screening D) Medical screening
A) To manage inventory B) To handle public relations C) To maximize profits D) To ensure suitable hiring and protect employees
A) Official records B) Maps and overlays C) Orders and manual D) Letters and diaries
A) Class IV B) Class II C) Class I D) Class III
A) They require extensive protection B) They are critical for business recovery C) They can cause inconvenience but are replaceable D) They are irreplaceable
A) Personal safety instruction B) Personnel security investigation C) Physical security implementation D) Professional security integration
A) Management positions B) Sensitive positions C) Entry-level positions D) Technical positions
A) Discretion B) Morals C) Loyalty D) Technical skills
A) To evaluate work performance B) To assess truthfulness during interviews C) To verify documents D) To check financial records
A) Technical competency B) Physical fitness C) National security suitability D) Management skills
A) 3,000 professional B) 2,000 professionals C) 1,500 professional D) 2,500 professional
A) 33 years old B) 21 years old C) 23 years old D) 30 years old E) 25 years old
A) The department of education B) The supervisory office for security and investigation Agency C) The national bureau of investigation D) The Philippine National Police
A) K9 security services B) Government intelligence work C) Public law enforcement D) Military operations
A) July 30,2022 B) August 30,2022 C) June 30,2021 D) July 30 ,2022
A) Must have a college degree B) Must be of lager age C) Must be physically and mentally fit D) Must be Filipino citizen
A) Exit interview B) Positive vetting C) Background investigation D) Prowling
A) Financial stability B) Career progression C) Educational background D) Work experience
A) Background investigation B) Undercover investigation C) Prowling D) Positive vetting
A) Barangay office B) Local court C) Municipal office D) PNP Directorate for intelligence
A) Only physical fitness tests B) Only neuro -psychiatric C) Only drug test D) Both neuro-psychiatric and drug test plus physical and mental fitness
A) The bureau of internal security B) The Department of justice C) The secretary of interior D) The chief of the philippine National Police or authorities representative
A) Restricted B) Secret C) Wtf D) Private E) Confidential |