A) To create mechanical resistance B) To generate electrical signals C) To prevent unauthorized entry and removal of items D) To store digital combinations
A) It uses electromagnetic force B) It requires a digital code C) It’s permanently attached D) It’s portable and detachable with a sliding hasp
A) A type of key manufacturer B) A security system designed C) A lock picker D) A lock installation tool
A) Through electromagnetic pulses B) Using physical obstructions to block incorrect keys C) Through biometric scanning D) With digital combinations
A) They operate solely on battery power B) They record usage time and user identity C) They require physical keys D) They use mechanical tumblers
A) Through mechanical pins B) Using electromagnetic force and an armature plate C) Through digital keypads only D) With rotating discs
A) Through mechanical key insertion B) Through radio frequency identification C) Using a sequence of numbers in proper order D) By scanning fingerprints
A) A master key opens all locks in the building B) A master key works only in emergency situations C) A grand master key opens all in the building D) A grand master key only works on specific floors
A) To keep employee records B) To store maintenance supplies C) To store original keys for all locks in the system D) To hold only duplicate keys
A) Only lost key incidents B) Reports from the person responsible for key control in personnel C) Only master key assignments D) Report from the security department
A) They serve exactly the same purpose B) A vault is part of the building structure and more heavily constructed C) A safe is larger than a vault D) A vault is portable while a safe is fixed
A) Only tracking master key B) Annual inventory checks C) Recording lock code numbers and key assignments D) Weekly audits only
A) Unannounced and by management B) Only during annual reviews C) On a fixed monthly schedule D) Only when key are lost
A) Weekly safe inspections B) Periodic accounting of all keys issued to employees C) Annual checks only D) Daily counts of master keys
A) Because it involves financial resources B) Because it involves people both as assets and potential threats C) Because it involves technological assets D) Because it involves physical infrastructure
A) Providing background investigation services B) Developing security awareness among employees C) Serving as a screening device in hiring D) Managing building access control systems
A) Storage and Retrieval B) Transfer C) Creation D) Classification
A) Restricted B) Top secret C) Confidential D) Secret
A) Class I-Vital Documents B) Class III-Useful Documents C) Class II-Important Documents D) Class IV-Non-essential Documents
A) Information is voluminous B) Information requires barriers C) Information is expansive D) Information is costly
A) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty B) A method of evaluating employee performance C) A process of monitoring employee computer usage D) A system of trafficking employee attendance
A) Social media passwords B) Foreign travel history C) Criminal record D) Employment history
A) To inspect with careful thoroughness through personal interviews under stress B) To conduct random drug testing C) To monitor employee internet usage D) To verify employment references
A) Financial inquiry B) Undercover investigation C) Positive vetting D) Exit interview
A) Training is necessary for the practice of NEED TO KNOW principle B) Personnel are the weakest link in the security chain C) Security systems are more important than personnel training D) Training makes security personnel conscious
A) Top secret B) Restricted C) Secret D) Private
A) Red B) Green C) Blue D) White
A) Information is costly B) Information requires barriers C) Information has a limited life D) Information is expansive
A) Employee development B) Financial awareness C) Development among employees D) Technical awareness
A) Protection against unfounded claims B) Immediate termination C) Public disclosure D) Legal prosecution
A) By serving as a screening device B) By managing payroll C) By conducting performance reviews D) By focusing on technical skills only
A) Cost effectiveness B) Need for establishment C) Automation of process D) Speed of hiring
A) During orientation and training B) During refresher conferences C) During the exit interview D) During security promotions
A) PNP Directorate for intelligence B) NBI clearance C) Barangay clearance D) ISAFP clearance
A) To issue final paycheck B) To conduct final performance evaluation C) To collect company property D) To give departing employees an opportunity to list grievances
A) Random security checks of employee workstations B) Physical surveillance of employees C) Monitoring of employee communications D) Predicting subject’s reactions in future critical situations through behavior observation
A) To increase office efficiency B) To deter and impede potential spies C) To simplify document sharing D) To reduce storage costs
A) Business methods only B) Original literary and musical work C) Customer database only D) Manufacturing processes only
A) Information security B) Technological security C) Physical security D) Personnel security
A) It requires the most financial investment B) It requires less oversight C) It involves protecting both assets and managing human threats D) It is easier to implement than other security measures
A) Documenta-written proof B) Documentum-teaching or lesson C) Doctrina-teaching method D) Docere-to show
A) Blue B) Green C) Red D) White
A) Documents that are irreplaceable and critical for recovery B) Documents that are replaceable with some effort C) Documents that are routine in nature D) Documents that cause minor inconvenience if lost
A) Restricted B) Private C) Secret D) Top secret E) Confidential
A) Only external threats B) Theft and sabotage C) Time management issues D) Attendance problems
A) Comprehensive approach to protection and screening B) Reactive approach only C) Financial approach D) Technological approach
A) Employee negligence or participation in theft B) Natural disasters C) Technology failures D) External theft
A) Supporting employee functions B) Monitoring computer systems C) Hiring suitable employees D) Providing security to employees
A) 5 B) 3 C) 6 D) 4 E) 2
A) Physical barriers B) Security education C) Financial auditing D) Emergency response
A) Secret B) Restricted C) Top secret D) Confidential
A) Class I-Vital documents B) Class III-useful documents C) Class IV-Non-essential documents D) Class II-important documents
A) 7 B) 8 C) 5 D) 6 E) 4
A) Municipal clearance B) Barangay clearance C) Court clearance D) NBI clearance
A) To conduct surveillance B) To check criminal records C) To verify past employment D) To predict future reactions
A) Competitor analysis B) Market research investigation only C) Background investigation of potential and current employees D) Criminal investigation only
A) Offers financial protection B) Provide physical protection only C) Manages employee benefits D) Protects against unfounded allegations and discrimination
A) Technical skills B) Management training C) Career development D) Security awareness
A) A secret formula B) A government-issued patent C) Words or symbols used to differentiate goods D) A copyright protection
A) Trademark B) Patents C) Copyrights D) Trade secret
A) Piracy B) Infringement C) Counterfeiting D) Misappropriation
A) Restricted B) Confidential C) Top secret D) Secret
A) Undercover investigation B) Financial and lifestyle inquiry C) Background investigation D) Positive vetting
A) Direct questioning B) Concealed identity C) Public monitoring D) Open surveillance
A) ISAFP clearance B) NBI clearance C) Local clearance D) Court clearance
A) To discover unknown problems B) To process final payments C) To terminate employment D) To issue clearances
A) Investigates employees suspected of wrongdoing B) Investigates only external threats C) Investigates competitor activities D) Investigates market conditions
A) Employee hiring screening B) Drug testing only C) Customer screening D) Medical screening
A) To ensure suitable hiring and protect employees B) To manage inventory C) To handle public relations D) To maximize profits
A) Orders and manual B) Official records C) Maps and overlays D) Letters and diaries
A) Class I B) Class IV C) Class II D) Class III
A) They can cause inconvenience but are replaceable B) They require extensive protection C) They are critical for business recovery D) They are irreplaceable
A) Physical security implementation B) Personal safety instruction C) Professional security integration D) Personnel security investigation
A) Technical positions B) Sensitive positions C) Entry-level positions D) Management positions
A) Morals B) Loyalty C) Technical skills D) Discretion
A) To assess truthfulness during interviews B) To evaluate work performance C) To check financial records D) To verify documents
A) National security suitability B) Technical competency C) Physical fitness D) Management skills
A) 2,500 professional B) 1,500 professional C) 3,000 professional D) 2,000 professionals
A) 30 years old B) 33 years old C) 23 years old D) 21 years old E) 25 years old
A) The department of education B) The Philippine National Police C) The supervisory office for security and investigation Agency D) The national bureau of investigation
A) Government intelligence work B) Public law enforcement C) Military operations D) K9 security services
A) June 30,2021 B) July 30 ,2022 C) July 30,2022 D) August 30,2022
A) Must be physically and mentally fit B) Must be Filipino citizen C) Must have a college degree D) Must be of lager age
A) Exit interview B) Positive vetting C) Prowling D) Background investigation
A) Financial stability B) Educational background C) Career progression D) Work experience
A) Undercover investigation B) Background investigation C) Positive vetting D) Prowling
A) Barangay office B) Municipal office C) Local court D) PNP Directorate for intelligence
A) Only neuro -psychiatric B) Only physical fitness tests C) Both neuro-psychiatric and drug test plus physical and mental fitness D) Only drug test
A) The chief of the philippine National Police or authorities representative B) The Department of justice C) The bureau of internal security D) The secretary of interior
A) Confidential B) Secret C) Wtf D) Private E) Restricted |