ThatQuiz Test Library Take this test now
helurr ismana
Contributed by: ulanday
  • 1. What is the primary function of a lock?
A) To prevent unauthorized entry and removal of items
B) To create mechanical resistance
C) To generate electrical signals
D) To store digital combinations
  • 2. What distinguishes a padlock from other lock types?
A) It uses electromagnetic force
B) It requires a digital code
C) It’s permanently attached
D) It’s portable and detachable with a sliding hasp
  • 3. What is “Peterman”in English terminology?
A) A lock installation tool
B) A lock picker
C) A security system designed
D) A type of key manufacturer
  • 4. How does a warded lock function?
A) With digital combinations
B) Using physical obstructions to block incorrect keys
C) Through biometric scanning
D) Through electromagnetic pulses
  • 5. What is unique about card-operated locks?
A) They use mechanical tumblers
B) They require physical keys
C) They record usage time and user identity
D) They operate solely on battery power
  • 6. How do electromagnetic locks secure an entry point?
A) Using electromagnetic force and an armature plate
B) Through digital keypads only
C) Through mechanical pins
D) With rotating discs
  • 7. How does a code-operated lock function?
A) Through mechanical key insertion
B) Through radio frequency identification
C) Using a sequence of numbers in proper order
D) By scanning fingerprints
  • 8. What is the primary difference between a grand master key and a master key?
A) A grand master key only works on specific floors
B) A grand master key opens all in the building
C) A master key works only in emergency situations
D) A master key opens all locks in the building
  • 9. What is the purpose of a key cabinet in a key control system?
A) To hold only duplicate keys
B) To keep employee records
C) To store original keys for all locks in the system
D) To store maintenance supplies
  • 10. What should be included in daily reports for key control?
A) Only lost key incidents
B) Reports from the person responsible for key control in personnel
C) Report from the security department
D) Only master key assignments
  • 11. What is the main distinction between a safe and a vault?
A) A vault is portable while a safe is fixed
B) They serve exactly the same purpose
C) A vault is part of the building structure and more heavily constructed
D) A safe is larger than a vault
  • 12. What is required for proper key record management?
A) Weekly audits only
B) Annual inventory checks
C) Only tracking master key
D) Recording lock code numbers and key assignments
  • 13. How often should key control Audits be conducted?
A) On a fixed monthly schedule
B) Only when key are lost
C) Unannounced and by management
D) Only during annual reviews
  • 14. What is required for proper key inventory management?
A) Weekly safe inspections
B) Annual checks only
C) Periodic accounting of all keys issued to employees
D) Daily counts of master keys
  • 15. What is the primary reason personnel security is considered the most important among the three main categories of security?
A) Because it involves physical infrastructure
B) Because it involves technological assets
C) Because it involves financial resources
D) Because it involves people both as assets and potential threats
  • 16. Which of the following is not a key function of personnel security?
A) Serving as a screening device in hiring
B) Developing security awareness among employees
C) Providing background investigation services
D) Managing building access control systems
  • 17. According to the document cycle,what is the first stage in information handling?
A) Storage and Retrieval
B) Transfer
C) Classification
D) Creation
  • 18. Which security classification would be applied to information that could cause “exceptionally grave damage “to the nation if disclosed?
A) Secret
B) Restricted
C) Top secret
D) Confidential
  • 19. Which type of documents are considered irreplaceable and needed to recover cash or replace equipment?
A) Class IV-Non-essential Documents
B) Class I-Vital Documents
C) Class III-Useful Documents
D) Class II-Important Documents
  • 20. What characteristic of information indicates that it can easily expand to cover a scope?
A) Information is expansive
B) Information is voluminous
C) Information requires barriers
D) Information is costly
  • 21. Personnel security investigation(PSI)is defined as ____________?
A) A system of trafficking employee attendance
B) A process of monitoring employee computer usage
C) A process of inquiry into character,reputation,discretion,integrity,morals and loyalty
D) A method of evaluating employee performance
  • 22. During a background investigation (BI),which component is Not typically included?
A) Foreign travel history
B) Employment history
C) Criminal record
D) Social media passwords
  • 23. What is the primary purpose of positive vetting?
A) To conduct random drug testing
B) To monitor employee internet usage
C) To inspect with careful thoroughness through personal interviews under stress
D) To verify employment references
  • 24. Which type of investigation involves placing an agent whose true identity remains unknown?
A) Exit interview
B) Financial inquiry
C) Undercover investigation
D) Positive vetting
  • 25. Which of the following is NOT one of the three security concepts?
A) Personnel are the weakest link in the security chain
B) Training makes security personnel conscious
C) Security systems are more important than personnel training
D) Training is necessary for the practice of NEED TO KNOW principle
  • 26. Under the classification of sensitive information which category would “marketing strategies “fail into?
A) Top secret
B) Restricted
C) Secret
D) Private
  • 27. What color code is associated with “Confidential “classification?
A) Red
B) Green
C) Blue
D) White
  • 28. Which characteristic of information suggests that it’s value can decrease over time?
A) Information is expansive
B) Information has a limited life
C) Information is costly
D) Information requires barriers
  • 29. What aspect of security awareness is emphasized?
A) Financial awareness
B) Development among employees
C) Technical awareness
D) Employee development
  • 30. What is key responsibility regarding allegations against employees ?
A) Legal prosecution
B) Public disclosure
C) Immediate termination
D) Protection against unfounded claims
  • 31. How does personnel security contribute to employee hiring?
A) By conducting performance reviews
B) By managing payroll
C) By focusing on technical skills only
D) By serving as a screening device
  • 32. What is emphasized regarding the system of hiring?
A) Speed of hiring
B) Need for establishment
C) Cost effectiveness
D) Automation of process
  • 33. During the security education program,when are employees typically asked to sign acknowledgment of company policies?
A) During refresher conferences
B) During the exit interview
C) During orientation and training
D) During security promotions
  • 34. Which of the following is NOT a type of national agency check (NAC)?
A) PNP Directorate for intelligence
B) Barangay clearance
C) ISAFP clearance
D) NBI clearance
  • 35. What is the purpose of an exit interview in personnel security?
A) To issue final paycheck
B) To give departing employees an opportunity to list grievances
C) To conduct final performance evaluation
D) To collect company property
  • 36. What is prowling in the personnel security?
A) Predicting subject’s reactions in future critical situations through behavior observation
B) Physical surveillance of employees
C) Random security checks of employee workstations
D) Monitoring of employee communications
  • 37. What is one of the main purposes of protecting classified materials?
A) To reduce storage costs
B) To simplify document sharing
C) To increase office efficiency
D) To deter and impede potential spies
  • 38. What can be protected under copyright law?
A) Original literary and musical work
B) Customer database only
C) Manufacturing processes only
D) Business methods only
  • 39. What is considered the most important among the three main categories of security?
A) Personnel security
B) Physical security
C) Technological security
D) Information security
  • 40. Why is personnel security considered most crucial?
A) It requires less oversight
B) It requires the most financial investment
C) It is easier to implement than other security measures
D) It involves protecting both assets and managing human threats
  • 41. What is the Latin origin of the word “Document “ and what does it denote?
A) Doctrina-teaching method
B) Documenta-written proof
C) Docere-to show
D) Documentum-teaching or lesson
  • 42. Which color code is associated with “Top secret “classified matter?
A) Green
B) White
C) Red
D) Blue
  • 43. What type of documents are considered Class Vital Documents?
A) Documents that are irreplaceable and critical for recovery
B) Documents that are routine in nature
C) Documents that are replaceable with some effort
D) Documents that cause minor inconvenience if lost
  • 44. Which classification of sensitive information relates specifically to employees?
A) Restricted
B) Private
C) Secret
D) Top secret
E) Confidential
  • 45. What type of activities are mentioned regarding employee misconduct?
A) Time management issues
B) Only external threats
C) Theft and sabotage
D) Attendance problems
  • 46. What approach to security is highlighted regarding employees?
A) Technological approach
B) Financial approach
C) Comprehensive approach to protection and screening
D) Reactive approach only
  • 47. What is a major source of losses?
A) Natural disasters
B) External theft
C) Employee negligence or participation in theft
D) Technology failures
  • 48. What is NOT mentioned as a purpose of personnel security?
A) Hiring suitable employees
B) Monitoring computer systems
C) Providing security to employees
D) Supporting employee functions
  • 49. How many key functions of personnel security are listed?
A) 4
B) 5
C) 6
D) 2
E) 3
  • 50. Which aspect is included in the scope of personnel security?
A) Security education
B) Financial auditing
C) Emergency response
D) Physical barriers
  • 51. Which type of classified matter would cause “exceptionally grave damage “to the nation if disclosed?
A) Confidential
B) Top secret
C) Restricted
D) Secret
  • 52. Which category of documents represents the bulk of records that need be protected in case of disaster?
A) Class IV-Non-essential documents
B) Class I-Vital documents
C) Class III-useful documents
D) Class II-important documents
  • 53. How many factors are primarily considered in conducting a background investigation?
A) 7
B) 8
C) 6
D) 4
E) 5
  • 54. Which is NOT a type of local agency check (LAC)?
A) Barangay clearance
B) NBI clearance
C) Court clearance
D) Municipal clearance
  • 55. What is the purpose of prowling in personnel security?
A) To check criminal records
B) To predict future reactions
C) To verify past employment
D) To conduct surveillance
  • 56. What type of investigation service does personnel security provide?
A) Market research investigation only
B) Criminal investigation only
C) Competitor analysis
D) Background investigation of potential and current employees
  • 57. What role does personnel security play in employee protection?
A) Manages employee benefits
B) Provide physical protection only
C) Offers financial protection
D) Protects against unfounded allegations and discrimination
  • 58. What developmental aspect does personnel security handle?
A) Technical skills
B) Security awareness
C) Management training
D) Career development
  • 59. What is a trademark?
A) A government-issued patent
B) A copyright protection
C) A secret formula
D) Words or symbols used to differentiate goods
  • 60. Which intellectual property protection is given to creators of original literary works?
A) Trade secret
B) Trademark
C) Copyrights
D) Patents
  • 61. What constitutes a trade secret violation in legal terms?
A) Piracy
B) Misappropriation
C) Counterfeiting
D) Infringement
  • 62. Which classified matter category uses red as its color code ?
A) Top secret
B) Confidential
C) Secret
D) Restricted
  • 63. Which investigation type focuses on income and mode of living?
A) Positive vetting
B) Financial and lifestyle inquiry
C) Undercover investigation
D) Background investigation
  • 64. What is a key characteristic of undercover investigation?
A) Direct questioning
B) Concealed identity
C) Open surveillance
D) Public monitoring
  • 65. Which National Agency Check (NAC)is related to military intelligence?
A) Court clearance
B) NBI clearance
C) ISAFP clearance
D) Local clearance
  • 66. What is the primary benefit of conducting exit interviews?
A) To terminate employment
B) To issue clearances
C) To discover unknown problems
D) To process final payments
  • 67. What investigative functions does personnel security serve?
A) Investigates competitor activities
B) Investigates market conditions
C) Investigates employees suspected of wrongdoing
D) Investigates only external threats
  • 68. What screening function does personnel security provide?
A) Customer screening
B) Medical screening
C) Drug testing only
D) Employee hiring screening
  • 69. What is one of the dual purposes of personnel security?
A) To manage inventory
B) To maximize profits
C) To handle public relations
D) To ensure suitable hiring and protect employees
  • 70. What type of documents are personal documents?
A) Maps and overlays
B) Orders and manual
C) Letters and diaries
D) Official records
  • 71. Which document class includes records whose reproduction requires considerable expense and labor?
A) Class III
B) Class I
C) Class II
D) Class IV
  • 72. What is the primary characteristic of class III -useful documents?
A) They can cause inconvenience but are replaceable
B) They are critical for business recovery
C) They are irreplaceable
D) They require extensive protection
  • 73. What element is part of PSI mentioned in the scope?
A) Professional security integration
B) Personnel security investigation
C) Personal safety instruction
D) Physical security implementation
  • 74. What type of position is specifically mentioned regarding background investigation?
A) Entry-level positions
B) Technical positions
C) Sensitive positions
D) Management positions
  • 75. Which factor is NOT considered in background investigation?
A) Discretion
B) Loyalty
C) Morals
D) Technical skills
  • 76. What is the purpose of deception detection techniques?
A) To verify documents
B) To evaluate work performance
C) To assess truthfulness during interviews
D) To check financial records
  • 77. What is positive vetting primarily used to assess?
A) Technical competency
B) Management skills
C) National security suitability
D) Physical fitness
  • 78. According to RA 11917,what is the maximum number of private security professionals that a private security Agency (PSA)can employ?
A) 1,500 professional
B) 2,000 professionals
C) 2,500 professional
D) 3,000 professional
  • 79. What is the minimum age requirement for a PSA operator or license?
A) 25 years old
B) 33 years old
C) 30 years old
D) 21 years old
E) 23 years old
  • 80. Who is responsible for issuing the letter of authority to conduct training for LESP? a the Philippine National Police?
A) The Philippine National Police
B) The department of education
C) The national bureau of investigation
D) The supervisory office for security and investigation Agency
  • 81. Which of the following services falls under the private security industry?
A) Government intelligence work
B) Public law enforcement
C) Military operations
D) K9 security services
  • 82. When did RA 11917 take effect?
A) June 30,2021
B) July 30 ,2022
C) August 30,2022
D) July 30,2022
  • 83. Which of the following is NOT a basic qualification requirement for obtaining an LESP?
A) Must have a college degree
B) Must be of lager age
C) Must be Filipino citizen
D) Must be physically and mentally fit
  • 84. Which investigation method use’s questionnaire like honesty test?
A) Background investigation
B) Prowling
C) Exit interview
D) Positive vetting
  • 85. What aspect does the earning -to debt ratio analyze?
A) Financial stability
B) Educational background
C) Work experience
D) Career progression
  • 86. What type of investigation involves placing an agent in an unknown role?
A) Prowling
B) Undercover investigation
C) Background investigation
D) Positive vetting
  • 87. Which agency is part of the national agency check (NAC)?
A) Barangay office
B) Municipal office
C) PNP Directorate for intelligence
D) Local court
  • 88. What health-related requirements must a PSA operator meet?
A) Only physical fitness tests
B) Only neuro -psychiatric
C) Both neuro-psychiatric and drug test plus physical and mental fitness
D) Only drug test
  • 89. Who has the authority to issue a license to operate (LTO)?
A) The Department of justice
B) The bureau of internal security
C) The chief of the philippine National Police or authorities representative
D) The secretary of interior
  • 90. Which sensitive information classification has strictly limited use and access?
A) Confidential
B) Secret
C) Wtf
D) Private
E) Restricted
Created with That Quiz — where a math practice test is always one click away.