A) Security Guard Regulation Act B) Private Security Agencies Act C) Private Security Services Industry Act D) Private Detective Act
A) License to Observe B) License to Operate C) License to Organize D) License to Officiate
A) License to Employ Security Professionals B) License to Enlist Security Personnel C) License to Exercise Security Profession D) License to Establish Security Profession
A) RA 7031 B) RA 10591 C) RA 9184 D) RA 5487
A) Chief of the Philippine National Police (PNP) or authorized representative B) Department of Justice C) Department of Interior and Local Government (DILG) D) Department of Labor and Employment (DOLE)
A) Any government police force B) Any person or juridical entity that recruits/security guards for hire C) Only K9-unit handlers D) Only persons providing alarm system monitoring
A) Must undergo pre-licensing training program B) Must own a security agency C) Must be at least 30 years old D) None — license is automatic
A) 2 years B) 5 years C) 4 years D) 3 years
A) 15% B) 10% C) 20% D) 25%
A) No, juridical entities are excluded B) No, only individuals can apply C) Yes, if wholly Filipino-owned and controlled D) Yes, but only foreign-owned ones
A) CCTV hardware suppliers and operations B) Private detective agencies C) Government police patrol units D) Security training agencies
A) False B) True
A) Using force to influence elections B) Operating without firearms C) Hiring only Filipino citizens D) Charging administrative fee of 20%
A) No training required B) On-the-job training only C) Pre-Licensing Training Programs D) D.Training only for K9 handlers
A) Government investigators on B) Only members of the Armed Forces of the Philippines C) Persons issued a valid LESP after satisfying requirements D) Any person who works as a guard without license
A) Security guards and watchmen B) Private investigators and K9 handlers C) All of the above D) Security consultants and system designers
A) Proof of previous experience only B) A bond issued by an accredited surety or insurance company C) Nothing — just a form D) A security deposit with the client
A) To limit the role of private security to non-critical establishments only B) To deregulate private security industry C) D To nationalize all private security agencies D) To strengthen regulation and establish quality standards for private security services
A) Yes — but only if foreign-owned B) No — limit is 2,000 C) No — limit is 1,000 D) Yes — there is no limit
A) RA 9165 (Comprehensive Dangerous Drugs Act) B) RA 6713 (Code of Conduct and Ethical Standards) C) RA 7721 (1989 Polaris Law) D) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act)
A) Basic Security Guard Course B) Both A and B C) Security Officers Training Course D) None of the above
A) Any school — public or private — regardless of accreditation B) Foreign training institutions only C) Only the PNP itself D) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA
A) True B) False
A) Must reapply in 1 year only B) Fine between ₱50,000 and ₱100,000 C) No penalty D) Automatic cancellation without fine
A) Equipped with firearms only B) Competent and able to complement law enforcement authorities in maintaining peace and order C) Allowed to perform law enforcement duties with full police powers D) Exempt from training requirements
A) Continue the inspection silently B) Explain the policy politely and perform the inspection professionally C) Refer the customer to HR D) Ignore the complaint
A) Report to your supervisor and document the behavior B) Tell other guards verbally only C) Ignore it unless a crime happens D) Confront him aggressively
A) Lock the doors B) Panic and run C) Activate the alarm and assist evacuation D) Call the media
A) Argue with the visitor B) Ignore protocol for VIPs C) Deny entry following access control procedure D) Let them enter since they look trustworthy
A) Record the incident and notify the security manager B) Post the footage online C) Approach immediately without backup D) Turn off the CCTV
A) Perform checks silently B) Greet customers and explain procedures briefly C) Check bags without permission D) Avoid eye contac
A) Open it immediately B) Move it to the office C) Establish a perimeter and report it D) Kick it to check for noise
A) Tell them to search again B) Ignore the report C) Allow entry without identification D) Immediately deactivate the card and issue a temporary one
A) Destroy old footage B) Gather evidence, review CCTV, and interview witnesses C) Accuse the suspect instantly D) Avoid writing a report
A) Allow skipping procedures B) Manage lines and communicate delays politely C) Shout to maintain order D) Close the entrance
A) Shout to maintain order B) Close the entrance C) Manage lines and communicate delays politely D) Allow skipping procedures
A) Strengthen perimeter checks and brief the team B) Cancel all work C) Lock the building permanently D) Ignore the intelligence
A) Point them in the wrong direction B) Assist them courteously C) Tell them it’s not your job D) Walk away
A) Report and correct the violation professionally B) Record it for personal use C) Join them D) Ignore it
A) Let them unload freely B) Allow entry immediately C) Verify documents and confirm with the office D) Ignore standard procedure
A) Let witnesses hold the item B) Pass evidence to anyone available C) Leave evidence unsecured D) Document all handlers of evidence clearly
A) Remove the camera yourself B) Ignore the issue C) Cover it D) Report and record the malfunction immediately
A) Skip screening B) Provide guided access within protocol C) Let them pass unscreened D) Ask for autographs
A) Block all exits B) Allow overcrowding C) Use force immediately D) Guide movements and maintain clear communication
A) Ignore all intel B) Spread the information immediately C) Analyze, verify, and confirm through reliable sources D) Assume it’s false
A) Use force immediately B) Shout at them C) Argue back D) Maintain calm and de-escalate the situation
A) Panic B) Crowd around the victim C) Call medical assistance and perform basic first aid D) Move the victim without assessment
A) Give false details B) Politely decline and report the inquiry C) Provide the information D) Ignore it
A) Leave documents on your desk B) Give copies to all employees C) Throw them in open bins D) Use secure storage and control access
A) Hang up immediately B) Ignore it C) Keep the caller talking, record details, and notify authorities D) Post the threat online
A) Delay the report for days B) Document facts clearly, chronologically, and objectively C) Add personal opinions D) Submit reports without details
A) CCTV placement map B) Interview checklist C) Organizational chart D) Risk impact matrix
A) Conducting background checks B) Installing lighting and surveillance C) Issuing ID badges D) Posting emergency hotlines
A) Conducting random integrity testing B) Hiring only referrals C) Issuing visitor passes D) Providing annual training
A) Allowing unlimited photocopying B) Filing documents alphabetically C) Locking cabinets and applying access logs D) Placing all documents in open shelves
A) Require encrypted USB devices and scanning B) Encourage file transfers via social media C) Disable all USB ports permanently D) Allow all employees to bring any USB
A) Listing all possible internal and external threats B) Preparing the annual budget C) Evaluating insurance policies D) Drafting job descriptions
A) Organizational mission-vision B) Security guard post order C) Risk probability-impact matrix D) Duty roster
A) Open-door policy for transparency B) Implementing biometric access control C) Allowing visitors to roam freely D) Enhancing office décor
A) Offering valet parking B) Tree planting C) Directional signs only D) Adequate lighting and patrols
A) Removing all emergency exit doors B) Posting "Do Not Enter" signs C) Permanently locking all exits D) Installing exit alarms and panic bars
A) Using color coding for case folders B) Displaying documents on bulletin boards C) Allowing interns unrestricted access D) Keeping confidential files in fire-resistant safes
A) Updating organizational charts B) Relocating operations to an alternate site C) Closing all branches temporarily D) Conducting team building
A) Install turnstiles with access control B) Provide umbrellas for visitors C) Remove all physical barriers D) Add more posters on policies
A) Budget allocation B) Risk assessment and analysis C) Monitoring guards' attendance D) Risk avoidance
A) Applying encryption and multi-factor authentication B) Removing passwords C) Sending drafts to social media inboxes D) Using unverified public Wi-Fi
A) General orientation lectures B) Evacuation and response drills C) Salary increase program D) Flexible work hours
A) Reviewing financial reports B) Rearranging inventory C) Performing penetration testing D) Listening to employee complaints
A) Allow them full system access B) Give them master keys C) Issue limited access IDs and monitor activities D) Trust referrals without checks
A) No markings to avoid suspicion B) Color-blind friendly icons C) “Confidential,” “Secret,” and “Restricted” stamps D) Decorative labels
A) Any software they prefer B) Open public Wi-Fi C) Personal email accounts D) VPN and secure company devices
A) Reducing guard deployment B) Eliminating CCTV monitoring C) Enhancing barriers, lighting, and patrols D) Increasing the number of blind spots
A) Removing antivirus software B) Playing music during work C) Implementing daily data backups D) Cmm Giving more breaks
A) Ignoring irregularities found B) Asking only senior guards for input C) Looking only at CCTV footage D) Reviewing guard logs and observing actual posts
A) Allow guests to enter without screening B) Establish access control points and metal detectors C) Rely solely on CCTV D) Remove barriers to ensure smooth flow
A) Create a work-from-home and rotation plan B) Cancel all IT support C) Lay off all employees D) Lock all offices without notice
A) Natural Surveillance B) Maintenance C) Access Control D) Territorial Reinforcement
A) Decorative landscaping B) High interior walls C) Multiple concealed corridors D) Clearly marked exit routes
A) Commercial districts with regulated lighting B) Mixed-use areas with pedestrian flow C) High-crime clusters near abandoned structures D) Residential zones with active barangay patrols
A) Employee comfort spaces B) Perimeter painting C) Interior signage D) Blast stand-off distance
A) Carpeted hallways B) Plain glass windows C) Motion-activated lighting D) Decorative fences
A) Narrow alleys with poor lighting B) Walkways monitored by CCTV C) Pathways near visible public spaces D) Open parks with community presence
A) Rooftop slope B) Wall color C) Window size D) Light distribution and shadow analysis
A) Strong perimeter control B) Enhanced visitor experience C) High community engagement D) Poor access management
A) Sidewalk artistry B) Billboard placement C) Road network connectivity D) Public decorations
A) Access control B) Natural surveillance C) C Information security D) Soft landscaping
A) Core administrative area B) Outdoor recreation area C) Reception lobby D) Parking façade
A) Walls without monitoring create blind spots B) Walls encourage community bonding C) Walls improve natural lighting D) High barriers eliminate all threats
A) Breaks easily for ventilation B) Reduces electricity consumption C) Fades sunlight exposure D) Provides resistance to forced entry
A) High-visibility parks B) Areas with poor maintenance ("broken windows") C) Areas with community events D) Active commercial zones
A) CCTV makes lighting unnecessary B) CCTV becomes ineffective due to darkness C) CCTV compensates fully for lighting D) CCTV automatically brightens footage
A) Interior temperature B) Structural stability C) Visibility for approaching threats D) Employee comfort
A) Reduces real estate value B) Identifies crowding that may mask hostile intent C) Improves interior aesthetics D) Helps determine paint colors
A) Glass doors + reinforced locks B) D CCTVs + guard patrols C) Hidden entrances + poor lighting D) High walls + intrusion alarms
A) Well-planned zoning B) Overly wide roads C) Pedestrian-friendly walkways D) Hidden escape routes in informal settlements
A) Employee morale B) Window design C) Furniture placement D) Visitor screening points
A) Aesthetic quality B) Height, strength, and placement C) Ability to blend with landscape D) Color scheme
A) Natural surveillance opportunities B) Economic viability C) Landscaping efficiency D) Employee punctuality
A) Improved traffic efficiency B) High environmental safety C) Elevated hazard and accident risk D) Increased social interaction
A) Temperature control B) Visibility of approaching individuals C) Noise reduction D) Decorative appeal |