A) Private Security Services Industry Act B) Private Security Agencies Act C) Security Guard Regulation Act D) Private Detective Act
A) License to Operate B) License to Organize C) License to Officiate D) License to Observe
A) License to Enlist Security Personnel B) License to Establish Security Profession C) License to Exercise Security Profession D) License to Employ Security Professionals
A) RA 10591 B) RA 5487 C) RA 7031 D) RA 9184
A) Chief of the Philippine National Police (PNP) or authorized representative B) Department of Labor and Employment (DOLE) C) Department of Justice D) Department of Interior and Local Government (DILG)
A) Only persons providing alarm system monitoring B) Any person or juridical entity that recruits/security guards for hire C) Any government police force D) Only K9-unit handlers
A) Must undergo pre-licensing training program B) Must be at least 30 years old C) Must own a security agency D) None — license is automatic
A) 3 years B) 4 years C) 5 years D) 2 years
A) 25% B) 10% C) 20% D) 15%
A) No, only individuals can apply B) Yes, but only foreign-owned ones C) Yes, if wholly Filipino-owned and controlled D) No, juridical entities are excluded
A) CCTV hardware suppliers and operations B) Private detective agencies C) Government police patrol units D) Security training agencies
A) False B) True
A) Using force to influence elections B) Charging administrative fee of 20% C) Operating without firearms D) Hiring only Filipino citizens
A) On-the-job training only B) No training required C) D.Training only for K9 handlers D) Pre-Licensing Training Programs
A) Only members of the Armed Forces of the Philippines B) Persons issued a valid LESP after satisfying requirements C) Government investigators on D) Any person who works as a guard without license
A) Security guards and watchmen B) All of the above C) Security consultants and system designers D) Private investigators and K9 handlers
A) A security deposit with the client B) Nothing — just a form C) Proof of previous experience only D) A bond issued by an accredited surety or insurance company
A) To strengthen regulation and establish quality standards for private security services B) To limit the role of private security to non-critical establishments only C) To deregulate private security industry D) D To nationalize all private security agencies
A) No — limit is 1,000 B) Yes — but only if foreign-owned C) No — limit is 2,000 D) Yes — there is no limit
A) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act) B) RA 9165 (Comprehensive Dangerous Drugs Act) C) RA 6713 (Code of Conduct and Ethical Standards) D) RA 7721 (1989 Polaris Law)
A) Basic Security Guard Course B) Security Officers Training Course C) Both A and B D) None of the above
A) Only the PNP itself B) Any school — public or private — regardless of accreditation C) Foreign training institutions only D) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA
A) False B) True
A) Fine between ₱50,000 and ₱100,000 B) Automatic cancellation without fine C) No penalty D) Must reapply in 1 year only
A) Competent and able to complement law enforcement authorities in maintaining peace and order B) Exempt from training requirements C) Equipped with firearms only D) Allowed to perform law enforcement duties with full police powers
A) Continue the inspection silently B) Ignore the complaint C) Refer the customer to HR D) Explain the policy politely and perform the inspection professionally
A) Report to your supervisor and document the behavior B) Ignore it unless a crime happens C) Tell other guards verbally only D) Confront him aggressively
A) Panic and run B) Activate the alarm and assist evacuation C) Call the media D) Lock the doors
A) Deny entry following access control procedure B) Argue with the visitor C) Let them enter since they look trustworthy D) Ignore protocol for VIPs
A) Approach immediately without backup B) Turn off the CCTV C) Post the footage online D) Record the incident and notify the security manager
A) Perform checks silently B) Greet customers and explain procedures briefly C) Avoid eye contac D) Check bags without permission
A) Open it immediately B) Kick it to check for noise C) Establish a perimeter and report it D) Move it to the office
A) Ignore the report B) Immediately deactivate the card and issue a temporary one C) Allow entry without identification D) Tell them to search again
A) Accuse the suspect instantly B) Gather evidence, review CCTV, and interview witnesses C) Avoid writing a report D) Destroy old footage
A) Shout to maintain order B) Manage lines and communicate delays politely C) Allow skipping procedures D) Close the entrance
A) Allow skipping procedures B) Close the entrance C) Shout to maintain order D) Manage lines and communicate delays politely
A) Strengthen perimeter checks and brief the team B) Cancel all work C) Lock the building permanently D) Ignore the intelligence
A) Walk away B) Tell them it’s not your job C) Point them in the wrong direction D) Assist them courteously
A) Report and correct the violation professionally B) Ignore it C) Join them D) Record it for personal use
A) Let them unload freely B) Ignore standard procedure C) Verify documents and confirm with the office D) Allow entry immediately
A) Pass evidence to anyone available B) Document all handlers of evidence clearly C) Leave evidence unsecured D) Let witnesses hold the item
A) Ignore the issue B) Cover it C) Report and record the malfunction immediately D) Remove the camera yourself
A) Provide guided access within protocol B) Let them pass unscreened C) Ask for autographs D) Skip screening
A) Block all exits B) Use force immediately C) Guide movements and maintain clear communication D) Allow overcrowding
A) Ignore all intel B) Spread the information immediately C) Assume it’s false D) Analyze, verify, and confirm through reliable sources
A) Shout at them B) Argue back C) Use force immediately D) Maintain calm and de-escalate the situation
A) Move the victim without assessment B) Call medical assistance and perform basic first aid C) Panic D) Crowd around the victim
A) Politely decline and report the inquiry B) Provide the information C) Give false details D) Ignore it
A) Throw them in open bins B) Leave documents on your desk C) Use secure storage and control access D) Give copies to all employees
A) Ignore it B) Keep the caller talking, record details, and notify authorities C) Hang up immediately D) Post the threat online
A) Submit reports without details B) Add personal opinions C) Delay the report for days D) Document facts clearly, chronologically, and objectively
A) Risk impact matrix B) Organizational chart C) CCTV placement map D) Interview checklist
A) Posting emergency hotlines B) Conducting background checks C) Installing lighting and surveillance D) Issuing ID badges
A) Conducting random integrity testing B) Hiring only referrals C) Issuing visitor passes D) Providing annual training
A) Placing all documents in open shelves B) Filing documents alphabetically C) Allowing unlimited photocopying D) Locking cabinets and applying access logs
A) Encourage file transfers via social media B) Disable all USB ports permanently C) Require encrypted USB devices and scanning D) Allow all employees to bring any USB
A) Listing all possible internal and external threats B) Evaluating insurance policies C) Drafting job descriptions D) Preparing the annual budget
A) Security guard post order B) Organizational mission-vision C) Duty roster D) Risk probability-impact matrix
A) Implementing biometric access control B) Allowing visitors to roam freely C) Enhancing office décor D) Open-door policy for transparency
A) Tree planting B) Adequate lighting and patrols C) Directional signs only D) Offering valet parking
A) Installing exit alarms and panic bars B) Posting "Do Not Enter" signs C) Permanently locking all exits D) Removing all emergency exit doors
A) Displaying documents on bulletin boards B) Using color coding for case folders C) Keeping confidential files in fire-resistant safes D) Allowing interns unrestricted access
A) Conducting team building B) Updating organizational charts C) Closing all branches temporarily D) Relocating operations to an alternate site
A) Provide umbrellas for visitors B) Remove all physical barriers C) Install turnstiles with access control D) Add more posters on policies
A) Monitoring guards' attendance B) Budget allocation C) Risk avoidance D) Risk assessment and analysis
A) Using unverified public Wi-Fi B) Applying encryption and multi-factor authentication C) Removing passwords D) Sending drafts to social media inboxes
A) Flexible work hours B) Evacuation and response drills C) Salary increase program D) General orientation lectures
A) Rearranging inventory B) Performing penetration testing C) Reviewing financial reports D) Listening to employee complaints
A) Allow them full system access B) Issue limited access IDs and monitor activities C) Give them master keys D) Trust referrals without checks
A) Decorative labels B) No markings to avoid suspicion C) “Confidential,” “Secret,” and “Restricted” stamps D) Color-blind friendly icons
A) Any software they prefer B) Personal email accounts C) Open public Wi-Fi D) VPN and secure company devices
A) Eliminating CCTV monitoring B) Increasing the number of blind spots C) Enhancing barriers, lighting, and patrols D) Reducing guard deployment
A) Removing antivirus software B) Cmm Giving more breaks C) Implementing daily data backups D) Playing music during work
A) Asking only senior guards for input B) Reviewing guard logs and observing actual posts C) Looking only at CCTV footage D) Ignoring irregularities found
A) Allow guests to enter without screening B) Establish access control points and metal detectors C) Rely solely on CCTV D) Remove barriers to ensure smooth flow
A) Cancel all IT support B) Lock all offices without notice C) Create a work-from-home and rotation plan D) Lay off all employees
A) Territorial Reinforcement B) Natural Surveillance C) Access Control D) Maintenance
A) Decorative landscaping B) Clearly marked exit routes C) High interior walls D) Multiple concealed corridors
A) Mixed-use areas with pedestrian flow B) High-crime clusters near abandoned structures C) Residential zones with active barangay patrols D) Commercial districts with regulated lighting
A) Interior signage B) Perimeter painting C) Blast stand-off distance D) Employee comfort spaces
A) Carpeted hallways B) Motion-activated lighting C) Decorative fences D) Plain glass windows
A) Narrow alleys with poor lighting B) Walkways monitored by CCTV C) Pathways near visible public spaces D) Open parks with community presence
A) Wall color B) Light distribution and shadow analysis C) Rooftop slope D) Window size
A) Poor access management B) Enhanced visitor experience C) Strong perimeter control D) High community engagement
A) Sidewalk artistry B) Road network connectivity C) Billboard placement D) Public decorations
A) Access control B) Soft landscaping C) C Information security D) Natural surveillance
A) Core administrative area B) Parking façade C) Outdoor recreation area D) Reception lobby
A) Walls encourage community bonding B) Walls without monitoring create blind spots C) Walls improve natural lighting D) High barriers eliminate all threats
A) Fades sunlight exposure B) Reduces electricity consumption C) Breaks easily for ventilation D) Provides resistance to forced entry
A) Active commercial zones B) High-visibility parks C) Areas with poor maintenance ("broken windows") D) Areas with community events
A) CCTV automatically brightens footage B) CCTV becomes ineffective due to darkness C) CCTV makes lighting unnecessary D) CCTV compensates fully for lighting
A) Visibility for approaching threats B) Structural stability C) Employee comfort D) Interior temperature
A) Improves interior aesthetics B) Helps determine paint colors C) Reduces real estate value D) Identifies crowding that may mask hostile intent
A) D CCTVs + guard patrols B) Hidden entrances + poor lighting C) Glass doors + reinforced locks D) High walls + intrusion alarms
A) Overly wide roads B) Pedestrian-friendly walkways C) Well-planned zoning D) Hidden escape routes in informal settlements
A) Visitor screening points B) Employee morale C) Furniture placement D) Window design
A) Aesthetic quality B) Height, strength, and placement C) Ability to blend with landscape D) Color scheme
A) Natural surveillance opportunities B) Employee punctuality C) Economic viability D) Landscaping efficiency
A) High environmental safety B) Elevated hazard and accident risk C) Increased social interaction D) Improved traffic efficiency
A) Noise reduction B) Temperature control C) Visibility of approaching individuals D) Decorative appeal |