ThatQuiz Test Library Take this test now
helurr ismana
Contributed by: ulanday
  • 1. What is the primary function of a lock?
A) To create mechanical resistance
B) To store digital combinations
C) To prevent unauthorized entry and removal of items
D) To generate electrical signals
  • 2. What distinguishes a padlock from other lock types?
A) It’s portable and detachable with a sliding hasp
B) It requires a digital code
C) It’s permanently attached
D) It uses electromagnetic force
  • 3. What is “Peterman”in English terminology?
A) A security system designed
B) A lock installation tool
C) A lock picker
D) A type of key manufacturer
  • 4. How does a warded lock function?
A) Using physical obstructions to block incorrect keys
B) Through biometric scanning
C) With digital combinations
D) Through electromagnetic pulses
  • 5. What is unique about card-operated locks?
A) They use mechanical tumblers
B) They require physical keys
C) They record usage time and user identity
D) They operate solely on battery power
  • 6. How do electromagnetic locks secure an entry point?
A) Through mechanical pins
B) With rotating discs
C) Through digital keypads only
D) Using electromagnetic force and an armature plate
  • 7. How does a code-operated lock function?
A) Using a sequence of numbers in proper order
B) Through mechanical key insertion
C) By scanning fingerprints
D) Through radio frequency identification
  • 8. What is the primary difference between a grand master key and a master key?
A) A master key opens all locks in the building
B) A grand master key opens all in the building
C) A master key works only in emergency situations
D) A grand master key only works on specific floors
  • 9. What is the purpose of a key cabinet in a key control system?
A) To hold only duplicate keys
B) To store original keys for all locks in the system
C) To keep employee records
D) To store maintenance supplies
  • 10. What should be included in daily reports for key control?
A) Only lost key incidents
B) Reports from the person responsible for key control in personnel
C) Report from the security department
D) Only master key assignments
  • 11. What is the main distinction between a safe and a vault?
A) A vault is part of the building structure and more heavily constructed
B) A vault is portable while a safe is fixed
C) A safe is larger than a vault
D) They serve exactly the same purpose
  • 12. What is required for proper key record management?
A) Only tracking master key
B) Recording lock code numbers and key assignments
C) Weekly audits only
D) Annual inventory checks
  • 13. How often should key control Audits be conducted?
A) Unannounced and by management
B) Only when key are lost
C) On a fixed monthly schedule
D) Only during annual reviews
  • 14. What is required for proper key inventory management?
A) Daily counts of master keys
B) Annual checks only
C) Periodic accounting of all keys issued to employees
D) Weekly safe inspections
  • 15. What is the primary reason personnel security is considered the most important among the three main categories of security?
A) Because it involves financial resources
B) Because it involves people both as assets and potential threats
C) Because it involves technological assets
D) Because it involves physical infrastructure
  • 16. Which of the following is not a key function of personnel security?
A) Developing security awareness among employees
B) Managing building access control systems
C) Providing background investigation services
D) Serving as a screening device in hiring
  • 17. According to the document cycle,what is the first stage in information handling?
A) Classification
B) Transfer
C) Creation
D) Storage and Retrieval
  • 18. Which security classification would be applied to information that could cause “exceptionally grave damage “to the nation if disclosed?
A) Confidential
B) Secret
C) Top secret
D) Restricted
  • 19. Which type of documents are considered irreplaceable and needed to recover cash or replace equipment?
A) Class II-Important Documents
B) Class IV-Non-essential Documents
C) Class I-Vital Documents
D) Class III-Useful Documents
  • 20. What characteristic of information indicates that it can easily expand to cover a scope?
A) Information is voluminous
B) Information is expansive
C) Information is costly
D) Information requires barriers
  • 21. Personnel security investigation(PSI)is defined as ____________?
A) A system of trafficking employee attendance
B) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty
C) A process of monitoring employee computer usage
D) A method of evaluating employee performance
  • 22. During a background investigation (BI),which component is Not typically included?
A) Employment history
B) Foreign travel history
C) Criminal record
D) Social media passwords
  • 23. What is the primary purpose of positive vetting?
A) To conduct random drug testing
B) To verify employment references
C) To monitor employee internet usage
D) To inspect with careful thoroughness through personal interviews under stress
  • 24. Which type of investigation involves placing an agent whose true identity remains unknown?
A) Exit interview
B) Financial inquiry
C) Positive vetting
D) Undercover investigation
  • 25. Which of the following is NOT one of the three security concepts?
A) Personnel are the weakest link in the security chain
B) Security systems are more important than personnel training
C) Training makes security personnel conscious
D) Training is necessary for the practice of NEED TO KNOW principle
  • 26. Under the classification of sensitive information which category would “marketing strategies “fail into?
A) Private
B) Secret
C) Top secret
D) Restricted
  • 27. What color code is associated with “Confidential “classification?
A) Red
B) Blue
C) Green
D) White
  • 28. Which characteristic of information suggests that it’s value can decrease over time?
A) Information is costly
B) Information is expansive
C) Information requires barriers
D) Information has a limited life
  • 29. What aspect of security awareness is emphasized?
A) Development among employees
B) Technical awareness
C) Employee development
D) Financial awareness
  • 30. What is key responsibility regarding allegations against employees ?
A) Protection against unfounded claims
B) Public disclosure
C) Immediate termination
D) Legal prosecution
  • 31. How does personnel security contribute to employee hiring?
A) By serving as a screening device
B) By managing payroll
C) By conducting performance reviews
D) By focusing on technical skills only
  • 32. What is emphasized regarding the system of hiring?
A) Speed of hiring
B) Automation of process
C) Need for establishment
D) Cost effectiveness
  • 33. During the security education program,when are employees typically asked to sign acknowledgment of company policies?
A) During refresher conferences
B) During orientation and training
C) During the exit interview
D) During security promotions
  • 34. Which of the following is NOT a type of national agency check (NAC)?
A) PNP Directorate for intelligence
B) ISAFP clearance
C) NBI clearance
D) Barangay clearance
  • 35. What is the purpose of an exit interview in personnel security?
A) To conduct final performance evaluation
B) To give departing employees an opportunity to list grievances
C) To issue final paycheck
D) To collect company property
  • 36. What is prowling in the personnel security?
A) Monitoring of employee communications
B) Predicting subject’s reactions in future critical situations through behavior observation
C) Random security checks of employee workstations
D) Physical surveillance of employees
  • 37. What is one of the main purposes of protecting classified materials?
A) To increase office efficiency
B) To reduce storage costs
C) To deter and impede potential spies
D) To simplify document sharing
  • 38. What can be protected under copyright law?
A) Manufacturing processes only
B) Customer database only
C) Business methods only
D) Original literary and musical work
  • 39. What is considered the most important among the three main categories of security?
A) Personnel security
B) Technological security
C) Physical security
D) Information security
  • 40. Why is personnel security considered most crucial?
A) It is easier to implement than other security measures
B) It requires the most financial investment
C) It requires less oversight
D) It involves protecting both assets and managing human threats
  • 41. What is the Latin origin of the word “Document “ and what does it denote?
A) Docere-to show
B) Documenta-written proof
C) Doctrina-teaching method
D) Documentum-teaching or lesson
  • 42. Which color code is associated with “Top secret “classified matter?
A) Red
B) Green
C) Blue
D) White
  • 43. What type of documents are considered Class Vital Documents?
A) Documents that are routine in nature
B) Documents that are replaceable with some effort
C) Documents that cause minor inconvenience if lost
D) Documents that are irreplaceable and critical for recovery
  • 44. Which classification of sensitive information relates specifically to employees?
A) Private
B) Top secret
C) Secret
D) Restricted
E) Confidential
  • 45. What type of activities are mentioned regarding employee misconduct?
A) Only external threats
B) Theft and sabotage
C) Time management issues
D) Attendance problems
  • 46. What approach to security is highlighted regarding employees?
A) Comprehensive approach to protection and screening
B) Reactive approach only
C) Financial approach
D) Technological approach
  • 47. What is a major source of losses?
A) Employee negligence or participation in theft
B) External theft
C) Natural disasters
D) Technology failures
  • 48. What is NOT mentioned as a purpose of personnel security?
A) Providing security to employees
B) Hiring suitable employees
C) Monitoring computer systems
D) Supporting employee functions
  • 49. How many key functions of personnel security are listed?
A) 6
B) 3
C) 5
D) 4
E) 2
  • 50. Which aspect is included in the scope of personnel security?
A) Security education
B) Emergency response
C) Physical barriers
D) Financial auditing
  • 51. Which type of classified matter would cause “exceptionally grave damage “to the nation if disclosed?
A) Confidential
B) Secret
C) Top secret
D) Restricted
  • 52. Which category of documents represents the bulk of records that need be protected in case of disaster?
A) Class IV-Non-essential documents
B) Class II-important documents
C) Class I-Vital documents
D) Class III-useful documents
  • 53. How many factors are primarily considered in conducting a background investigation?
A) 4
B) 5
C) 6
D) 7
E) 8
  • 54. Which is NOT a type of local agency check (LAC)?
A) Municipal clearance
B) Barangay clearance
C) Court clearance
D) NBI clearance
  • 55. What is the purpose of prowling in personnel security?
A) To check criminal records
B) To verify past employment
C) To conduct surveillance
D) To predict future reactions
  • 56. What type of investigation service does personnel security provide?
A) Competitor analysis
B) Market research investigation only
C) Background investigation of potential and current employees
D) Criminal investigation only
  • 57. What role does personnel security play in employee protection?
A) Offers financial protection
B) Provide physical protection only
C) Manages employee benefits
D) Protects against unfounded allegations and discrimination
  • 58. What developmental aspect does personnel security handle?
A) Security awareness
B) Technical skills
C) Career development
D) Management training
  • 59. What is a trademark?
A) A government-issued patent
B) A copyright protection
C) Words or symbols used to differentiate goods
D) A secret formula
  • 60. Which intellectual property protection is given to creators of original literary works?
A) Trade secret
B) Copyrights
C) Patents
D) Trademark
  • 61. What constitutes a trade secret violation in legal terms?
A) Misappropriation
B) Piracy
C) Infringement
D) Counterfeiting
  • 62. Which classified matter category uses red as its color code ?
A) Secret
B) Confidential
C) Top secret
D) Restricted
  • 63. Which investigation type focuses on income and mode of living?
A) Undercover investigation
B) Background investigation
C) Positive vetting
D) Financial and lifestyle inquiry
  • 64. What is a key characteristic of undercover investigation?
A) Public monitoring
B) Direct questioning
C) Concealed identity
D) Open surveillance
  • 65. Which National Agency Check (NAC)is related to military intelligence?
A) NBI clearance
B) Court clearance
C) Local clearance
D) ISAFP clearance
  • 66. What is the primary benefit of conducting exit interviews?
A) To terminate employment
B) To discover unknown problems
C) To issue clearances
D) To process final payments
  • 67. What investigative functions does personnel security serve?
A) Investigates market conditions
B) Investigates competitor activities
C) Investigates only external threats
D) Investigates employees suspected of wrongdoing
  • 68. What screening function does personnel security provide?
A) Drug testing only
B) Customer screening
C) Employee hiring screening
D) Medical screening
  • 69. What is one of the dual purposes of personnel security?
A) To manage inventory
B) To handle public relations
C) To maximize profits
D) To ensure suitable hiring and protect employees
  • 70. What type of documents are personal documents?
A) Official records
B) Maps and overlays
C) Orders and manual
D) Letters and diaries
  • 71. Which document class includes records whose reproduction requires considerable expense and labor?
A) Class IV
B) Class II
C) Class I
D) Class III
  • 72. What is the primary characteristic of class III -useful documents?
A) They require extensive protection
B) They are critical for business recovery
C) They can cause inconvenience but are replaceable
D) They are irreplaceable
  • 73. What element is part of PSI mentioned in the scope?
A) Personal safety instruction
B) Personnel security investigation
C) Physical security implementation
D) Professional security integration
  • 74. What type of position is specifically mentioned regarding background investigation?
A) Management positions
B) Sensitive positions
C) Entry-level positions
D) Technical positions
  • 75. Which factor is NOT considered in background investigation?
A) Discretion
B) Morals
C) Loyalty
D) Technical skills
  • 76. What is the purpose of deception detection techniques?
A) To evaluate work performance
B) To assess truthfulness during interviews
C) To verify documents
D) To check financial records
  • 77. What is positive vetting primarily used to assess?
A) Technical competency
B) Physical fitness
C) National security suitability
D) Management skills
  • 78. According to RA 11917,what is the maximum number of private security professionals that a private security Agency (PSA)can employ?
A) 3,000 professional
B) 2,000 professionals
C) 1,500 professional
D) 2,500 professional
  • 79. What is the minimum age requirement for a PSA operator or license?
A) 33 years old
B) 21 years old
C) 23 years old
D) 30 years old
E) 25 years old
  • 80. Who is responsible for issuing the letter of authority to conduct training for LESP? a the Philippine National Police?
A) The department of education
B) The supervisory office for security and investigation Agency
C) The national bureau of investigation
D) The Philippine National Police
  • 81. Which of the following services falls under the private security industry?
A) K9 security services
B) Government intelligence work
C) Public law enforcement
D) Military operations
  • 82. When did RA 11917 take effect?
A) July 30,2022
B) August 30,2022
C) June 30,2021
D) July 30 ,2022
  • 83. Which of the following is NOT a basic qualification requirement for obtaining an LESP?
A) Must have a college degree
B) Must be of lager age
C) Must be physically and mentally fit
D) Must be Filipino citizen
  • 84. Which investigation method use’s questionnaire like honesty test?
A) Exit interview
B) Positive vetting
C) Background investigation
D) Prowling
  • 85. What aspect does the earning -to debt ratio analyze?
A) Financial stability
B) Career progression
C) Educational background
D) Work experience
  • 86. What type of investigation involves placing an agent in an unknown role?
A) Background investigation
B) Undercover investigation
C) Prowling
D) Positive vetting
  • 87. Which agency is part of the national agency check (NAC)?
A) Barangay office
B) Local court
C) Municipal office
D) PNP Directorate for intelligence
  • 88. What health-related requirements must a PSA operator meet?
A) Only physical fitness tests
B) Only neuro -psychiatric
C) Only drug test
D) Both neuro-psychiatric and drug test plus physical and mental fitness
  • 89. Who has the authority to issue a license to operate (LTO)?
A) The bureau of internal security
B) The Department of justice
C) The secretary of interior
D) The chief of the philippine National Police or authorities representative
  • 90. Which sensitive information classification has strictly limited use and access?
A) Restricted
B) Secret
C) Wtf
D) Private
E) Confidential
Created with That Quiz — where a math practice test is always one click away.