A) To generate electrical signals B) To create mechanical resistance C) To store digital combinations D) To prevent unauthorized entry and removal of items
A) It requires a digital code B) It’s permanently attached C) It’s portable and detachable with a sliding hasp D) It uses electromagnetic force
A) A type of key manufacturer B) A lock installation tool C) A lock picker D) A security system designed
A) Through biometric scanning B) Using physical obstructions to block incorrect keys C) Through electromagnetic pulses D) With digital combinations
A) They require physical keys B) They record usage time and user identity C) They operate solely on battery power D) They use mechanical tumblers
A) Through mechanical pins B) With rotating discs C) Using electromagnetic force and an armature plate D) Through digital keypads only
A) Through radio frequency identification B) By scanning fingerprints C) Using a sequence of numbers in proper order D) Through mechanical key insertion
A) A grand master key only works on specific floors B) A master key opens all locks in the building C) A master key works only in emergency situations D) A grand master key opens all in the building
A) To store original keys for all locks in the system B) To keep employee records C) To store maintenance supplies D) To hold only duplicate keys
A) Only master key assignments B) Reports from the person responsible for key control in personnel C) Only lost key incidents D) Report from the security department
A) A vault is part of the building structure and more heavily constructed B) A safe is larger than a vault C) They serve exactly the same purpose D) A vault is portable while a safe is fixed
A) Weekly audits only B) Only tracking master key C) Recording lock code numbers and key assignments D) Annual inventory checks
A) Only when key are lost B) Unannounced and by management C) On a fixed monthly schedule D) Only during annual reviews
A) Weekly safe inspections B) Periodic accounting of all keys issued to employees C) Annual checks only D) Daily counts of master keys
A) Because it involves physical infrastructure B) Because it involves people both as assets and potential threats C) Because it involves financial resources D) Because it involves technological assets
A) Providing background investigation services B) Serving as a screening device in hiring C) Developing security awareness among employees D) Managing building access control systems
A) Classification B) Creation C) Transfer D) Storage and Retrieval
A) Secret B) Restricted C) Top secret D) Confidential
A) Class I-Vital Documents B) Class IV-Non-essential Documents C) Class III-Useful Documents D) Class II-Important Documents
A) Information is costly B) Information requires barriers C) Information is expansive D) Information is voluminous
A) A method of evaluating employee performance B) A system of trafficking employee attendance C) A process of monitoring employee computer usage D) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty
A) Criminal record B) Social media passwords C) Employment history D) Foreign travel history
A) To conduct random drug testing B) To inspect with careful thoroughness through personal interviews under stress C) To monitor employee internet usage D) To verify employment references
A) Exit interview B) Financial inquiry C) Undercover investigation D) Positive vetting
A) Security systems are more important than personnel training B) Training is necessary for the practice of NEED TO KNOW principle C) Training makes security personnel conscious D) Personnel are the weakest link in the security chain
A) Secret B) Top secret C) Restricted D) Private
A) Blue B) White C) Green D) Red
A) Information is costly B) Information requires barriers C) Information is expansive D) Information has a limited life
A) Development among employees B) Employee development C) Technical awareness D) Financial awareness
A) Legal prosecution B) Public disclosure C) Protection against unfounded claims D) Immediate termination
A) By conducting performance reviews B) By managing payroll C) By focusing on technical skills only D) By serving as a screening device
A) Automation of process B) Speed of hiring C) Need for establishment D) Cost effectiveness
A) During orientation and training B) During the exit interview C) During security promotions D) During refresher conferences
A) NBI clearance B) PNP Directorate for intelligence C) ISAFP clearance D) Barangay clearance
A) To issue final paycheck B) To collect company property C) To conduct final performance evaluation D) To give departing employees an opportunity to list grievances
A) Physical surveillance of employees B) Random security checks of employee workstations C) Monitoring of employee communications D) Predicting subject’s reactions in future critical situations through behavior observation
A) To reduce storage costs B) To deter and impede potential spies C) To increase office efficiency D) To simplify document sharing
A) Customer database only B) Original literary and musical work C) Business methods only D) Manufacturing processes only
A) Technological security B) Information security C) Physical security D) Personnel security
A) It requires the most financial investment B) It involves protecting both assets and managing human threats C) It requires less oversight D) It is easier to implement than other security measures
A) Docere-to show B) Documentum-teaching or lesson C) Documenta-written proof D) Doctrina-teaching method
A) Red B) Green C) White D) Blue
A) Documents that are irreplaceable and critical for recovery B) Documents that cause minor inconvenience if lost C) Documents that are routine in nature D) Documents that are replaceable with some effort
A) Private B) Secret C) Confidential D) Top secret E) Restricted
A) Only external threats B) Attendance problems C) Theft and sabotage D) Time management issues
A) Technological approach B) Comprehensive approach to protection and screening C) Reactive approach only D) Financial approach
A) Technology failures B) External theft C) Natural disasters D) Employee negligence or participation in theft
A) Monitoring computer systems B) Hiring suitable employees C) Supporting employee functions D) Providing security to employees
A) 3 B) 6 C) 4 D) 5 E) 2
A) Emergency response B) Security education C) Financial auditing D) Physical barriers
A) Top secret B) Confidential C) Restricted D) Secret
A) Class III-useful documents B) Class I-Vital documents C) Class IV-Non-essential documents D) Class II-important documents
A) 6 B) 4 C) 7 D) 5 E) 8
A) Municipal clearance B) Barangay clearance C) Court clearance D) NBI clearance
A) To check criminal records B) To verify past employment C) To predict future reactions D) To conduct surveillance
A) Competitor analysis B) Background investigation of potential and current employees C) Market research investigation only D) Criminal investigation only
A) Protects against unfounded allegations and discrimination B) Provide physical protection only C) Manages employee benefits D) Offers financial protection
A) Technical skills B) Career development C) Management training D) Security awareness
A) A government-issued patent B) A copyright protection C) Words or symbols used to differentiate goods D) A secret formula
A) Trade secret B) Patents C) Trademark D) Copyrights
A) Counterfeiting B) Piracy C) Misappropriation D) Infringement
A) Top secret B) Secret C) Confidential D) Restricted
A) Financial and lifestyle inquiry B) Positive vetting C) Undercover investigation D) Background investigation
A) Concealed identity B) Open surveillance C) Public monitoring D) Direct questioning
A) NBI clearance B) Local clearance C) Court clearance D) ISAFP clearance
A) To issue clearances B) To process final payments C) To terminate employment D) To discover unknown problems
A) Investigates employees suspected of wrongdoing B) Investigates market conditions C) Investigates competitor activities D) Investigates only external threats
A) Drug testing only B) Customer screening C) Medical screening D) Employee hiring screening
A) To handle public relations B) To maximize profits C) To manage inventory D) To ensure suitable hiring and protect employees
A) Letters and diaries B) Maps and overlays C) Orders and manual D) Official records
A) Class I B) Class II C) Class III D) Class IV
A) They require extensive protection B) They are critical for business recovery C) They can cause inconvenience but are replaceable D) They are irreplaceable
A) Personnel security investigation B) Physical security implementation C) Professional security integration D) Personal safety instruction
A) Technical positions B) Sensitive positions C) Management positions D) Entry-level positions
A) Loyalty B) Technical skills C) Morals D) Discretion
A) To check financial records B) To assess truthfulness during interviews C) To evaluate work performance D) To verify documents
A) Physical fitness B) National security suitability C) Management skills D) Technical competency
A) 2,000 professionals B) 2,500 professional C) 3,000 professional D) 1,500 professional
A) 25 years old B) 21 years old C) 23 years old D) 30 years old E) 33 years old
A) The supervisory office for security and investigation Agency B) The department of education C) The Philippine National Police D) The national bureau of investigation
A) Military operations B) K9 security services C) Public law enforcement D) Government intelligence work
A) June 30,2021 B) July 30 ,2022 C) August 30,2022 D) July 30,2022
A) Must be physically and mentally fit B) Must be of lager age C) Must have a college degree D) Must be Filipino citizen
A) Background investigation B) Prowling C) Positive vetting D) Exit interview
A) Financial stability B) Work experience C) Career progression D) Educational background
A) Prowling B) Background investigation C) Positive vetting D) Undercover investigation
A) Barangay office B) Local court C) Municipal office D) PNP Directorate for intelligence
A) Only drug test B) Only neuro -psychiatric C) Both neuro-psychiatric and drug test plus physical and mental fitness D) Only physical fitness tests
A) The bureau of internal security B) The Department of justice C) The secretary of interior D) The chief of the philippine National Police or authorities representative
A) Confidential B) Wtf C) Secret D) Private E) Restricted |