ThatQuiz Test Library Take this test now
LEA3-ISAMANA
Contributed by: Three
  • 1. What is the short title of RA 11917?
A) Private Security Services Industry Act
B) Private Security Agencies Act
C) Security Guard Regulation Act
D) Private Detective Act
  • 2. What does the acronym “LTO” stand for in RA 11917?
A) License to Operate
B) License to Organize
C) License to Officiate
D) License to Observe
  • 3. What does “LESP” refer to under RA 11917?
A) License to Enlist Security Personnel
B) License to Establish Security Profession
C) License to Exercise Security Profession
D) License to Employ Security Professionals
  • 4. Which existing law is repealed by RA 11917?
A) RA 10591
B) RA 5487
C) RA 7031
D) RA 9184
  • 5. Who issues the LTO or LESP under RA 11917?
A) Chief of the Philippine National Police (PNP) or authorized representative
B) Department of Labor and Employment (DOLE)
C) Department of Justice
D) Department of Interior and Local Government (DILG)
  • 6. Which of the following is considered a “Private Security Agency (PSA)” under RA 11917?
A) Only persons providing alarm system monitoring
B) Any person or juridical entity that recruits/security guards for hire
C) Any government police force
D) Only K9-unit handlers
  • 7. What is required before a person can be granted a LESP?
A) Must undergo pre-licensing training program
B) Must be at least 30 years old
C) Must own a security agency
D) None — license is automatic
  • 8. How long is a valid LESP issued under RA 11917 (subject to renewal)?
A) 3 years
B) 4 years
C) 5 years
D) 2 years
  • 9. What is the minimum administrative fee that a PSA may charge its clients (as a percentage of contract cost)?
A) 25%
B) 10%
C) 20%
D) 15%
  • 10. Can a juridical entity (corporation) apply for a License to Operate (LTO) under RA 11917?
A) No, only individuals can apply
B) Yes, but only foreign-owned ones
C) Yes, if wholly Filipino-owned and controlled
D) No, juridical entities are excluded
  • 11. Which among the following is NOT part of the “Private Security Industry” as defined in RA 11917?
A) CCTV hardware suppliers and operations
B) Private detective agencies
C) Government police patrol units
D) Security training agencies
  • 12. True or False: A PSA may remain valid indefinitely once it obtains an LTO.
A) False
B) True
  • 13. Which of the following is a ground for cancellation or suspension of a PSA’s license under RA 11917?
A) Using force to influence elections
B) Charging administrative fee of 20%
C) Operating without firearms
D) Hiring only Filipino citizens
  • 14. What kind of training programs does RA 11917 require before practice?
A) On-the-job training only
B) No training required
C) D.Training only for K9 handlers
D) Pre-Licensing Training Programs
  • 15. Under RA 11917, who qualifies as a “Private Security Professional (PSP)”?
A) Only members of the Armed Forces of the Philippines
B) Persons issued a valid LESP after satisfying requirements
C) Government investigators on
D) Any person who works as a guard without license
  • 16. Which of the following is included among the possible roles under PSP as defined by RA 11917?
A) Security guards and watchmen
B) All of the above
C) Security consultants and system designers
D) Private investigators and K9 handlers
  • 17. What must accompany an application for LTO under RA 11917?
A) A security deposit with the client
B) Nothing — just a form
C) Proof of previous experience only
D) A bond issued by an accredited surety or insurance company
  • 18. Which of the following is a declared policy of the State under RA 11917?
A) To strengthen regulation and establish quality standards for private security services
B) To limit the role of private security to non-critical establishments only
C) To deregulate private security industry
D) D To nationalize all private security agencies
  • 19. Can a private security agency deploy more than 2,000 security professionals under RA 11917?
A) No — limit is 1,000
B) Yes — but only if foreign-owned
C) No — limit is 2,000
D) Yes — there is no limit
  • 20. Which law does RA 11917 reference when allowing issuance of firearms to PSAs under certain conditions?
A) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act)
B) RA 9165 (Comprehensive Dangerous Drugs Act)
C) RA 6713 (Code of Conduct and Ethical Standards)
D) RA 7721 (1989 Polaris Law)
  • 21. Pre-licensing training under RA 11917 may include which of the following courses?
A) Basic Security Guard Course
B) Security Officers Training Course
C) Both A and B
D) None of the above
  • 22. Who among the following may be granted LTO for a Private Security Training Agency (PSTA)?
A) Only the PNP itself
B) Any school — public or private — regardless of accreditation
C) Foreign training institutions only
D) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA
  • 23. True or False: Under RA 11917, a person who renders private security services without a valid LESP may be penalized.
A) False
B) True
  • 24. What happens if a PSA operates with an expired LTO under RA 11917?
A) Fine between ₱50,000 and ₱100,000
B) Automatic cancellation without fine
C) No penalty
D) Must reapply in 1 year only
  • 25. The purpose of RA 11917 includes ensuring that private security personnel are?
A) Competent and able to complement law enforcement authorities in maintaining peace and order
B) Exempt from training requirements
C) Equipped with firearms only
D) Allowed to perform law enforcement duties with full police powers
  • 26. A customer complains about a bag inspection at the gate. As a security officer, what is the most appropriate action to apply customer-relations skills?
A) Continue the inspection silently
B) Ignore the complaint
C) Refer the customer to HR
D) Explain the policy politely and perform the inspection professionally
  • 27. You receive information about a suspicious individual frequently surveying the perimeter. What is your best immediate application of security protocol?
A) Report to your supervisor and document the behavior
B) Ignore it unless a crime happens
C) Tell other guards verbally only
D) Confront him aggressively
  • 28. A fire breaks out in a storage room. What should the security officer apply first?
A) Panic and run
B) Activate the alarm and assist evacuation
C) Call the media
D) Lock the doors
  • 29. A visitor refuses to sign the logbook. What should you apply to handle the situation?
A) Deny entry following access control procedure
B) Argue with the visitor
C) Let them enter since they look trustworthy
D) Ignore protocol for VIPs
  • 30. While on CCTV monitoring, you observe an employee frequently accessing restricted areas. What is your best action?
A) Approach immediately without backup
B) Turn off the CCTV
C) Post the footage online
D) Record the incident and notify the security manager
  • 31. To apply customer service skills during security checks, what should you do?
A) Perform checks silently
B) Greet customers and explain procedures briefly
C) Avoid eye contac
D) Check bags without permission
  • 32. You find a suspicious unattended bag in the lobby. What protocol should you apply?
A) Open it immediately
B) Kick it to check for noise
C) Establish a perimeter and report it
D) Move it to the office
  • 33. An employee reports a lost access card. What should you apply?
A) Ignore the report
B) Immediately deactivate the card and issue a temporary one
C) Allow entry without identification
D) Tell them to search again
  • 34. You are investigating a theft. What is the best application of corporate investigation skills?
A) Accuse the suspect instantly
B) Gather evidence, review CCTV, and interview witnesses
C) Avoid writing a report
D) Destroy old footage
  • 35. During peak hours, people become impatient at security queues. What should you apply?
A) Shout to maintain order
B) Manage lines and communicate delays politely
C) Allow skipping procedures
D) Close the entrance
  • 36. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Allow skipping procedures
B) Close the entrance
C) Shout to maintain order
D) Manage lines and communicate delays politely
  • 37. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Strengthen perimeter checks and brief the team
B) Cancel all work
C) Lock the building permanently
D) Ignore the intelligence
  • 38. While patrolling, a customer asks for directions. What customer-relations skill do you apply?
A) Walk away
B) Tell them it’s not your job
C) Point them in the wrong direction
D) Assist them courteously
  • 39. A co-worker is violating safety rules. What should you apply?
A) Report and correct the violation professionally
B) Ignore it
C) Join them
D) Record it for personal use
  • 40. A delivery truck arrives without prior notice. What protocol should you apply?
A) Let them unload freely
B) Ignore standard procedure
C) Verify documents and confirm with the office
D) Allow entry immediately
  • 41. During an investigation, you must ensure chain of custody. How do you apply this?
A) Pass evidence to anyone available
B) Document all handlers of evidence clearly
C) Leave evidence unsecured
D) Let witnesses hold the item
  • 42. You notice a CCTV camera malfunctioning. What should you apply?
A) Ignore the issue
B) Cover it
C) Report and record the malfunction immediately
D) Remove the camera yourself
  • 43. A VIP arrives at the premises. What should you do to apply security and customer service?
A) Provide guided access within protocol
B) Let them pass unscreened
C) Ask for autographs
D) Skip screening
  • 44. You are assigned to crowd control during an event. What should you apply?
A) Block all exits
B) Use force immediately
C) Guide movements and maintain clear communication
D) Allow overcrowding
  • 45. A colleague provides unverified information about a potential threat. What is the correct application of intelligence validation?
A) Ignore all intel
B) Spread the information immediately
C) Assume it’s false
D) Analyze, verify, and confirm through reliable sources
  • 46. A customer becomes verbally aggressive. What should you apply?
A) Shout at them
B) Argue back
C) Use force immediately
D) Maintain calm and de-escalate the situation
  • 47. During a medical emergency, what should you apply first?
A) Move the victim without assessment
B) Call medical assistance and perform basic first aid
C) Panic
D) Crowd around the victim
  • 48. A suspicious person asks questions about shift schedules. What should you apply?
A) Politely decline and report the inquiry
B) Provide the information
C) Give false details
D) Ignore it
  • 49. You are tasked to secure sensitive corporate documents. What should you apply?
A) Throw them in open bins
B) Leave documents on your desk
C) Use secure storage and control access
D) Give copies to all employees
  • 50. The building receives a bomb threat via phone. What should you apply?
A) Ignore it
B) Keep the caller talking, record details, and notify authorities
C) Hang up immediately
D) Post the threat online
  • 51. You are to apply proper incident reporting. What should you do?
A) Submit reports without details
B) Add personal opinions
C) Delay the report for days
D) Document facts clearly, chronologically, and objectively
  • 52. During a security survey, you are tasked to verify blind spots in a warehouse. Which tool should you apply to best identify these vulnerable areas?
A) Risk impact matrix
B) Organizational chart
C) CCTV placement map
D) Interview checklist
  • 53. To apply physical security principles, which measure should you implement first when securing a newly constructed perimeter fence?
A) Posting emergency hotlines
B) Conducting background checks
C) Installing lighting and surveillance
D) Issuing ID badges
  • 54. When creating a personnel security plan, which of the following actions best applies the principle of “trust but verify”?
A) Conducting random integrity testing
B) Hiring only referrals
C) Issuing visitor passes
D) Providing annual training
  • 55. A company wants to secure confidential files stored in cabinets. Which application of document security is MOST appropriate?
A) Placing all documents in open shelves
B) Filing documents alphabetically
C) Allowing unlimited photocopying
D) Locking cabinets and applying access logs
  • 56. To apply information security protocols in an office with frequent USB use, what should you implement?
A) Encourage file transfers via social media
B) Disable all USB ports permanently
C) Require encrypted USB devices and scanning
D) Allow all employees to bring any USB
  • 57. You are asked to conduct a threat assessment for a bank. Which step best applies risk identification?
A) Listing all possible internal and external threats
B) Evaluating insurance policies
C) Drafting job descriptions
D) Preparing the annual budget
  • 58. To determine which risks should be addressed first, which tool should be applied?
A) Security guard post order
B) Organizational mission-vision
C) Duty roster
D) Risk probability-impact matrix
  • 59. The HR office wants to limit unauthorized access. Which application of personnel security is MOST effective?
A) Implementing biometric access control
B) Allowing visitors to roam freely
C) Enhancing office décor
D) Open-door policy for transparency
  • 60. When applying physical security in parking areas, which measure provides the strongest deterrence?
A) Tree planting
B) Adequate lighting and patrols
C) Directional signs only
D) Offering valet parking
  • 61. During a security survey, you identify several unsecured emergency exits. What should you apply to correct the issue without violating safety codes?
A) Installing exit alarms and panic bars
B) Posting "Do Not Enter" signs
C) Permanently locking all exits
D) Removing all emergency exit doors
  • 62. What is the correct application of document security in a legal department?
A) Displaying documents on bulletin boards
B) Using color coding for case folders
C) Keeping confidential files in fire-resistant safes
D) Allowing interns unrestricted access
  • 63. When applying BCM, which action ensures critical operations continue after a fire?
A) Conducting team building
B) Updating organizational charts
C) Closing all branches temporarily
D) Relocating operations to an alternate site
  • 64. A company wants to prevent tailgating at entrances. Which measure should you apply?
A) Provide umbrellas for visitors
B) Remove all physical barriers
C) Install turnstiles with access control
D) Add more posters on policies
  • 65. In applying risk management, which step follows risk identification?
A) Monitoring guards' attendance
B) Budget allocation
C) Risk avoidance
D) Risk assessment and analysis
  • 66. Which is an applied method to protect information transmitted through email?
A) Using unverified public Wi-Fi
B) Applying encryption and multi-factor authentication
C) Removing passwords
D) Sending drafts to social media inboxes
  • 67. A security manager must ensure all staff understand emergency roles. Which BCM component should be applied?
A) Flexible work hours
B) Evacuation and response drills
C) Salary increase program
D) General orientation lectures
  • 68. When conducting a security survey of a storage facility, what applied method determines the effectiveness of locks?
A) Rearranging inventory
B) Performing penetration testing
C) Reviewing financial reports
D) Listening to employee complaints
  • 69. Applying personnel security, how should temporary workers be managed
A) Allow them full system access
B) Issue limited access IDs and monitor activities
C) Give them master keys
D) Trust referrals without checks
  • 70. When applying document security for classified materials, which marking system should be used?
A) Decorative labels
B) No markings to avoid suspicion
C) “Confidential,” “Secret,” and “Restricted” stamps
D) Color-blind friendly icons
  • 71. To apply information security during remote work, what should employees use?
A) Any software they prefer
B) Personal email accounts
C) Open public Wi-Fi
D) VPN and secure company devices
  • 72. In risk management, which applied strategy reduces the likelihood of intrusion?
A) Eliminating CCTV monitoring
B) Increasing the number of blind spots
C) Enhancing barriers, lighting, and patrols
D) Reducing guard deployment
  • 73. Which BCM action ensures quick restoration of digital records after system failure?
A) Removing antivirus software
B) Cmm Giving more breaks
C) Implementing daily data backups
D) Playing music during work
  • 74. What is the correct application of a security survey to improve guard performance
A) Asking only senior guards for input
B) Reviewing guard logs and observing actual posts
C) Looking only at CCTV footage
D) Ignoring irregularities found
  • 75. To apply physical security for a VIP event, which measure is MOST appropriate?
A) Allow guests to enter without screening
B) Establish access control points and metal detectors
C) Rely solely on CCTV
D) Remove barriers to ensure smooth flow
  • 76. A company must ensure operations continue during a pandemic. Which BCM strategy should be applied?
A) Cancel all IT support
B) Lock all offices without notice
C) Create a work-from-home and rotation plan
D) Lay off all employees
  • 77. Which principle of Crime Prevention Through Environmental Design (CPTED) is best applied when analyzing how transparent store-front windows reduce concealment zones?
A) Territorial Reinforcement
B) Natural Surveillance
C) Access Control
D) Maintenance
  • 78. When evaluating a building layout, which design feature most effectively integrates architectural security with emergency egress analysis?
A) Decorative landscaping
B) Clearly marked exit routes
C) High interior walls
D) Multiple concealed corridors
  • 79. In analyzing urban planning risks, which pattern indicates ineffective zoning related to crime concentration?
A) Mixed-use areas with pedestrian flow
B) High-crime clusters near abandoned structures
C) Residential zones with active barangay patrols
D) Commercial districts with regulated lighting
  • 80. A facility’s main entrance is exposed to direct vehicle access from a public road. Which security concept should be analyzed to mitigate vehicle-borne threats?
A) Interior signage
B) Perimeter painting
C) Blast stand-off distance
D) Employee comfort spaces
  • 81. Which architectural element provides both deterrence and detection when evaluating layered security?
A) Carpeted hallways
B) Motion-activated lighting
C) Decorative fences
D) Plain glass windows
  • 82. When analyzing pathways in urban design, which condition most increases risk according to CPTED?
A) Narrow alleys with poor lighting
B) Walkways monitored by CCTV
C) Pathways near visible public spaces
D) Open parks with community presence
  • 83. A security planner is assessing how building orientation affects nighttime risks. Which factor is most critical?
A) Wall color
B) Light distribution and shadow analysis
C) Rooftop slope
D) Window size
  • 84. In physical security analysis, what does the presence of multiple unlocked access doors indicate?
A) Poor access management
B) Enhanced visitor experience
C) Strong perimeter control
D) High community engagement
  • 85. Which urban planning factor most affects emergency response time analysis?
A) Sidewalk artistry
B) Road network connectivity
C) Billboard placement
D) Public decorations
  • 86. Analyzing the effectiveness of bollards in a building’s perimeter relates to which security function?
A) Access control
B) Soft landscaping
C) C Information security
D) Natural surveillance
  • 87. When assessing a security zone plan, which area is most vulnerable if mixed with unrestricted public space?
A) Core administrative area
B) Parking façade
C) Outdoor recreation area
D) Reception lobby
  • 88. A facility uses high walls but lacks surveillance. What analysis best explains this weakness?
A) Walls encourage community bonding
B) Walls without monitoring create blind spots
C) Walls improve natural lighting
D) High barriers eliminate all threats
  • 89. In analyzing building materials for security, laminated glass is preferred because it:
A) Fades sunlight exposure
B) Reduces electricity consumption
C) Breaks easily for ventilation
D) Provides resistance to forced entry
  • 90. When analyzing urban crime patterns, which environmental factor often correlates with increased vandalism?
A) Active commercial zones
B) High-visibility parks
C) Areas with poor maintenance ("broken windows")
D) Areas with community events
  • 91. If a facility has excellent CCTV but poor lighting, what can be concluded?
A) CCTV automatically brightens footage
B) CCTV becomes ineffective due to darkness
C) CCTV makes lighting unnecessary
D) CCTV compensates fully for lighting
  • 92. A building entrance facing a blind corner increases risk because it reduces:
A) Visibility for approaching threats
B) Structural stability
C) Employee comfort
D) Interior temperature
  • 93. Analyzing pedestrian traffic flow is essential in security planning because it:
A) Improves interior aesthetics
B) Helps determine paint colors
C) Reduces real estate value
D) Identifies crowding that may mask hostile intent
  • 94. In physical security evaluation, which combination increases intrusion risk?
A) D CCTVs + guard patrols
B) Hidden entrances + poor lighting
C) Glass doors + reinforced locks
D) High walls + intrusion alarms
  • 95. Which urban design flaw most contributes to crime displacement analysis?
A) Overly wide roads
B) Pedestrian-friendly walkways
C) Well-planned zoning
D) Hidden escape routes in informal settlements
  • 96. The absence of a defined perimeter in architectural design makes it most difficult to analyze:
A) Visitor screening points
B) Employee morale
C) Furniture placement
D) Window design
  • 97. When analyzing physical barriers, which factor most determines their effectiveness?
A) Aesthetic quality
B) Height, strength, and placement
C) Ability to blend with landscape
D) Color scheme
  • 98. A poorly lit parking area is high-risk primarily because it reduces:
A) Natural surveillance opportunities
B) Employee punctuality
C) Economic viability
D) Landscaping efficiency
  • 99. What can be inferred when pedestrian walkways intersect with high-speed traffic lanes?
A) High environmental safety
B) Elevated hazard and accident risk
C) Increased social interaction
D) Improved traffic efficiency
  • 100. If a building uses reflective surfaces at entrances, analysis shows it enhances security by improving:
A) Noise reduction
B) Temperature control
C) Visibility of approaching individuals
D) Decorative appeal
Created with That Quiz — the site for test creation and grading in math and other subjects.