ThatQuiz Test Library Take this test now
helurr ismana
Contributed by: ulanday
  • 1. What is the primary function of a lock?
A) To generate electrical signals
B) To create mechanical resistance
C) To store digital combinations
D) To prevent unauthorized entry and removal of items
  • 2. What distinguishes a padlock from other lock types?
A) It requires a digital code
B) It’s permanently attached
C) It’s portable and detachable with a sliding hasp
D) It uses electromagnetic force
  • 3. What is “Peterman”in English terminology?
A) A type of key manufacturer
B) A lock installation tool
C) A lock picker
D) A security system designed
  • 4. How does a warded lock function?
A) Through biometric scanning
B) Using physical obstructions to block incorrect keys
C) Through electromagnetic pulses
D) With digital combinations
  • 5. What is unique about card-operated locks?
A) They require physical keys
B) They record usage time and user identity
C) They operate solely on battery power
D) They use mechanical tumblers
  • 6. How do electromagnetic locks secure an entry point?
A) Through mechanical pins
B) With rotating discs
C) Using electromagnetic force and an armature plate
D) Through digital keypads only
  • 7. How does a code-operated lock function?
A) Through radio frequency identification
B) By scanning fingerprints
C) Using a sequence of numbers in proper order
D) Through mechanical key insertion
  • 8. What is the primary difference between a grand master key and a master key?
A) A grand master key only works on specific floors
B) A master key opens all locks in the building
C) A master key works only in emergency situations
D) A grand master key opens all in the building
  • 9. What is the purpose of a key cabinet in a key control system?
A) To store original keys for all locks in the system
B) To keep employee records
C) To store maintenance supplies
D) To hold only duplicate keys
  • 10. What should be included in daily reports for key control?
A) Only master key assignments
B) Reports from the person responsible for key control in personnel
C) Only lost key incidents
D) Report from the security department
  • 11. What is the main distinction between a safe and a vault?
A) A vault is part of the building structure and more heavily constructed
B) A safe is larger than a vault
C) They serve exactly the same purpose
D) A vault is portable while a safe is fixed
  • 12. What is required for proper key record management?
A) Weekly audits only
B) Only tracking master key
C) Recording lock code numbers and key assignments
D) Annual inventory checks
  • 13. How often should key control Audits be conducted?
A) Only when key are lost
B) Unannounced and by management
C) On a fixed monthly schedule
D) Only during annual reviews
  • 14. What is required for proper key inventory management?
A) Weekly safe inspections
B) Periodic accounting of all keys issued to employees
C) Annual checks only
D) Daily counts of master keys
  • 15. What is the primary reason personnel security is considered the most important among the three main categories of security?
A) Because it involves physical infrastructure
B) Because it involves people both as assets and potential threats
C) Because it involves financial resources
D) Because it involves technological assets
  • 16. Which of the following is not a key function of personnel security?
A) Providing background investigation services
B) Serving as a screening device in hiring
C) Developing security awareness among employees
D) Managing building access control systems
  • 17. According to the document cycle,what is the first stage in information handling?
A) Classification
B) Creation
C) Transfer
D) Storage and Retrieval
  • 18. Which security classification would be applied to information that could cause “exceptionally grave damage “to the nation if disclosed?
A) Secret
B) Restricted
C) Top secret
D) Confidential
  • 19. Which type of documents are considered irreplaceable and needed to recover cash or replace equipment?
A) Class I-Vital Documents
B) Class IV-Non-essential Documents
C) Class III-Useful Documents
D) Class II-Important Documents
  • 20. What characteristic of information indicates that it can easily expand to cover a scope?
A) Information is costly
B) Information requires barriers
C) Information is expansive
D) Information is voluminous
  • 21. Personnel security investigation(PSI)is defined as ____________?
A) A method of evaluating employee performance
B) A system of trafficking employee attendance
C) A process of monitoring employee computer usage
D) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty
  • 22. During a background investigation (BI),which component is Not typically included?
A) Criminal record
B) Social media passwords
C) Employment history
D) Foreign travel history
  • 23. What is the primary purpose of positive vetting?
A) To conduct random drug testing
B) To inspect with careful thoroughness through personal interviews under stress
C) To monitor employee internet usage
D) To verify employment references
  • 24. Which type of investigation involves placing an agent whose true identity remains unknown?
A) Exit interview
B) Financial inquiry
C) Undercover investigation
D) Positive vetting
  • 25. Which of the following is NOT one of the three security concepts?
A) Security systems are more important than personnel training
B) Training is necessary for the practice of NEED TO KNOW principle
C) Training makes security personnel conscious
D) Personnel are the weakest link in the security chain
  • 26. Under the classification of sensitive information which category would “marketing strategies “fail into?
A) Secret
B) Top secret
C) Restricted
D) Private
  • 27. What color code is associated with “Confidential “classification?
A) Blue
B) White
C) Green
D) Red
  • 28. Which characteristic of information suggests that it’s value can decrease over time?
A) Information is costly
B) Information requires barriers
C) Information is expansive
D) Information has a limited life
  • 29. What aspect of security awareness is emphasized?
A) Development among employees
B) Employee development
C) Technical awareness
D) Financial awareness
  • 30. What is key responsibility regarding allegations against employees ?
A) Legal prosecution
B) Public disclosure
C) Protection against unfounded claims
D) Immediate termination
  • 31. How does personnel security contribute to employee hiring?
A) By conducting performance reviews
B) By managing payroll
C) By focusing on technical skills only
D) By serving as a screening device
  • 32. What is emphasized regarding the system of hiring?
A) Automation of process
B) Speed of hiring
C) Need for establishment
D) Cost effectiveness
  • 33. During the security education program,when are employees typically asked to sign acknowledgment of company policies?
A) During orientation and training
B) During the exit interview
C) During security promotions
D) During refresher conferences
  • 34. Which of the following is NOT a type of national agency check (NAC)?
A) NBI clearance
B) PNP Directorate for intelligence
C) ISAFP clearance
D) Barangay clearance
  • 35. What is the purpose of an exit interview in personnel security?
A) To issue final paycheck
B) To collect company property
C) To conduct final performance evaluation
D) To give departing employees an opportunity to list grievances
  • 36. What is prowling in the personnel security?
A) Physical surveillance of employees
B) Random security checks of employee workstations
C) Monitoring of employee communications
D) Predicting subject’s reactions in future critical situations through behavior observation
  • 37. What is one of the main purposes of protecting classified materials?
A) To reduce storage costs
B) To deter and impede potential spies
C) To increase office efficiency
D) To simplify document sharing
  • 38. What can be protected under copyright law?
A) Customer database only
B) Original literary and musical work
C) Business methods only
D) Manufacturing processes only
  • 39. What is considered the most important among the three main categories of security?
A) Technological security
B) Information security
C) Physical security
D) Personnel security
  • 40. Why is personnel security considered most crucial?
A) It requires the most financial investment
B) It involves protecting both assets and managing human threats
C) It requires less oversight
D) It is easier to implement than other security measures
  • 41. What is the Latin origin of the word “Document “ and what does it denote?
A) Docere-to show
B) Documentum-teaching or lesson
C) Documenta-written proof
D) Doctrina-teaching method
  • 42. Which color code is associated with “Top secret “classified matter?
A) Red
B) Green
C) White
D) Blue
  • 43. What type of documents are considered Class Vital Documents?
A) Documents that are irreplaceable and critical for recovery
B) Documents that cause minor inconvenience if lost
C) Documents that are routine in nature
D) Documents that are replaceable with some effort
  • 44. Which classification of sensitive information relates specifically to employees?
A) Private
B) Secret
C) Confidential
D) Top secret
E) Restricted
  • 45. What type of activities are mentioned regarding employee misconduct?
A) Only external threats
B) Attendance problems
C) Theft and sabotage
D) Time management issues
  • 46. What approach to security is highlighted regarding employees?
A) Technological approach
B) Comprehensive approach to protection and screening
C) Reactive approach only
D) Financial approach
  • 47. What is a major source of losses?
A) Technology failures
B) External theft
C) Natural disasters
D) Employee negligence or participation in theft
  • 48. What is NOT mentioned as a purpose of personnel security?
A) Monitoring computer systems
B) Hiring suitable employees
C) Supporting employee functions
D) Providing security to employees
  • 49. How many key functions of personnel security are listed?
A) 3
B) 6
C) 4
D) 5
E) 2
  • 50. Which aspect is included in the scope of personnel security?
A) Emergency response
B) Security education
C) Financial auditing
D) Physical barriers
  • 51. Which type of classified matter would cause “exceptionally grave damage “to the nation if disclosed?
A) Top secret
B) Confidential
C) Restricted
D) Secret
  • 52. Which category of documents represents the bulk of records that need be protected in case of disaster?
A) Class III-useful documents
B) Class I-Vital documents
C) Class IV-Non-essential documents
D) Class II-important documents
  • 53. How many factors are primarily considered in conducting a background investigation?
A) 6
B) 4
C) 7
D) 5
E) 8
  • 54. Which is NOT a type of local agency check (LAC)?
A) Municipal clearance
B) Barangay clearance
C) Court clearance
D) NBI clearance
  • 55. What is the purpose of prowling in personnel security?
A) To check criminal records
B) To verify past employment
C) To predict future reactions
D) To conduct surveillance
  • 56. What type of investigation service does personnel security provide?
A) Competitor analysis
B) Background investigation of potential and current employees
C) Market research investigation only
D) Criminal investigation only
  • 57. What role does personnel security play in employee protection?
A) Protects against unfounded allegations and discrimination
B) Provide physical protection only
C) Manages employee benefits
D) Offers financial protection
  • 58. What developmental aspect does personnel security handle?
A) Technical skills
B) Career development
C) Management training
D) Security awareness
  • 59. What is a trademark?
A) A government-issued patent
B) A copyright protection
C) Words or symbols used to differentiate goods
D) A secret formula
  • 60. Which intellectual property protection is given to creators of original literary works?
A) Trade secret
B) Patents
C) Trademark
D) Copyrights
  • 61. What constitutes a trade secret violation in legal terms?
A) Counterfeiting
B) Piracy
C) Misappropriation
D) Infringement
  • 62. Which classified matter category uses red as its color code ?
A) Top secret
B) Secret
C) Confidential
D) Restricted
  • 63. Which investigation type focuses on income and mode of living?
A) Financial and lifestyle inquiry
B) Positive vetting
C) Undercover investigation
D) Background investigation
  • 64. What is a key characteristic of undercover investigation?
A) Concealed identity
B) Open surveillance
C) Public monitoring
D) Direct questioning
  • 65. Which National Agency Check (NAC)is related to military intelligence?
A) NBI clearance
B) Local clearance
C) Court clearance
D) ISAFP clearance
  • 66. What is the primary benefit of conducting exit interviews?
A) To issue clearances
B) To process final payments
C) To terminate employment
D) To discover unknown problems
  • 67. What investigative functions does personnel security serve?
A) Investigates employees suspected of wrongdoing
B) Investigates market conditions
C) Investigates competitor activities
D) Investigates only external threats
  • 68. What screening function does personnel security provide?
A) Drug testing only
B) Customer screening
C) Medical screening
D) Employee hiring screening
  • 69. What is one of the dual purposes of personnel security?
A) To handle public relations
B) To maximize profits
C) To manage inventory
D) To ensure suitable hiring and protect employees
  • 70. What type of documents are personal documents?
A) Letters and diaries
B) Maps and overlays
C) Orders and manual
D) Official records
  • 71. Which document class includes records whose reproduction requires considerable expense and labor?
A) Class I
B) Class II
C) Class III
D) Class IV
  • 72. What is the primary characteristic of class III -useful documents?
A) They require extensive protection
B) They are critical for business recovery
C) They can cause inconvenience but are replaceable
D) They are irreplaceable
  • 73. What element is part of PSI mentioned in the scope?
A) Personnel security investigation
B) Physical security implementation
C) Professional security integration
D) Personal safety instruction
  • 74. What type of position is specifically mentioned regarding background investigation?
A) Technical positions
B) Sensitive positions
C) Management positions
D) Entry-level positions
  • 75. Which factor is NOT considered in background investigation?
A) Loyalty
B) Technical skills
C) Morals
D) Discretion
  • 76. What is the purpose of deception detection techniques?
A) To check financial records
B) To assess truthfulness during interviews
C) To evaluate work performance
D) To verify documents
  • 77. What is positive vetting primarily used to assess?
A) Physical fitness
B) National security suitability
C) Management skills
D) Technical competency
  • 78. According to RA 11917,what is the maximum number of private security professionals that a private security Agency (PSA)can employ?
A) 2,000 professionals
B) 2,500 professional
C) 3,000 professional
D) 1,500 professional
  • 79. What is the minimum age requirement for a PSA operator or license?
A) 25 years old
B) 21 years old
C) 23 years old
D) 30 years old
E) 33 years old
  • 80. Who is responsible for issuing the letter of authority to conduct training for LESP? a the Philippine National Police?
A) The supervisory office for security and investigation Agency
B) The department of education
C) The Philippine National Police
D) The national bureau of investigation
  • 81. Which of the following services falls under the private security industry?
A) Military operations
B) K9 security services
C) Public law enforcement
D) Government intelligence work
  • 82. When did RA 11917 take effect?
A) June 30,2021
B) July 30 ,2022
C) August 30,2022
D) July 30,2022
  • 83. Which of the following is NOT a basic qualification requirement for obtaining an LESP?
A) Must be physically and mentally fit
B) Must be of lager age
C) Must have a college degree
D) Must be Filipino citizen
  • 84. Which investigation method use’s questionnaire like honesty test?
A) Background investigation
B) Prowling
C) Positive vetting
D) Exit interview
  • 85. What aspect does the earning -to debt ratio analyze?
A) Financial stability
B) Work experience
C) Career progression
D) Educational background
  • 86. What type of investigation involves placing an agent in an unknown role?
A) Prowling
B) Background investigation
C) Positive vetting
D) Undercover investigation
  • 87. Which agency is part of the national agency check (NAC)?
A) Barangay office
B) Local court
C) Municipal office
D) PNP Directorate for intelligence
  • 88. What health-related requirements must a PSA operator meet?
A) Only drug test
B) Only neuro -psychiatric
C) Both neuro-psychiatric and drug test plus physical and mental fitness
D) Only physical fitness tests
  • 89. Who has the authority to issue a license to operate (LTO)?
A) The bureau of internal security
B) The Department of justice
C) The secretary of interior
D) The chief of the philippine National Police or authorities representative
  • 90. Which sensitive information classification has strictly limited use and access?
A) Confidential
B) Wtf
C) Secret
D) Private
E) Restricted
Created with That Quiz — where a math practice test is always one click away.