ThatQuiz Test Library Take this test now
LEA3-ISAMANA
Contributed by: Three
  • 1. What is the short title of RA 11917?
A) Private Security Services Industry Act
B) Private Security Agencies Act
C) Private Detective Act
D) Security Guard Regulation Act
  • 2. What does the acronym “LTO” stand for in RA 11917?
A) License to Operate
B) License to Officiate
C) License to Observe
D) License to Organize
  • 3. What does “LESP” refer to under RA 11917?
A) License to Exercise Security Profession
B) License to Establish Security Profession
C) License to Employ Security Professionals
D) License to Enlist Security Personnel
  • 4. Which existing law is repealed by RA 11917?
A) RA 7031
B) RA 9184
C) RA 10591
D) RA 5487
  • 5. Who issues the LTO or LESP under RA 11917?
A) Department of Labor and Employment (DOLE)
B) Chief of the Philippine National Police (PNP) or authorized representative
C) Department of Interior and Local Government (DILG)
D) Department of Justice
  • 6. Which of the following is considered a “Private Security Agency (PSA)” under RA 11917?
A) Only K9-unit handlers
B) Any person or juridical entity that recruits/security guards for hire
C) Any government police force
D) Only persons providing alarm system monitoring
  • 7. What is required before a person can be granted a LESP?
A) Must undergo pre-licensing training program
B) Must be at least 30 years old
C) None — license is automatic
D) Must own a security agency
  • 8. How long is a valid LESP issued under RA 11917 (subject to renewal)?
A) 3 years
B) 5 years
C) 2 years
D) 4 years
  • 9. What is the minimum administrative fee that a PSA may charge its clients (as a percentage of contract cost)?
A) 25%
B) 20%
C) 15%
D) 10%
  • 10. Can a juridical entity (corporation) apply for a License to Operate (LTO) under RA 11917?
A) Yes, but only foreign-owned ones
B) No, juridical entities are excluded
C) No, only individuals can apply
D) Yes, if wholly Filipino-owned and controlled
  • 11. Which among the following is NOT part of the “Private Security Industry” as defined in RA 11917?
A) CCTV hardware suppliers and operations
B) Government police patrol units
C) Security training agencies
D) Private detective agencies
  • 12. True or False: A PSA may remain valid indefinitely once it obtains an LTO.
A) True
B) False
  • 13. Which of the following is a ground for cancellation or suspension of a PSA’s license under RA 11917?
A) Using force to influence elections
B) Hiring only Filipino citizens
C) Operating without firearms
D) Charging administrative fee of 20%
  • 14. What kind of training programs does RA 11917 require before practice?
A) Pre-Licensing Training Programs
B) On-the-job training only
C) No training required
D) D.Training only for K9 handlers
  • 15. Under RA 11917, who qualifies as a “Private Security Professional (PSP)”?
A) Any person who works as a guard without license
B) Persons issued a valid LESP after satisfying requirements
C) Only members of the Armed Forces of the Philippines
D) Government investigators on
  • 16. Which of the following is included among the possible roles under PSP as defined by RA 11917?
A) All of the above
B) Security guards and watchmen
C) Private investigators and K9 handlers
D) Security consultants and system designers
  • 17. What must accompany an application for LTO under RA 11917?
A) Nothing — just a form
B) Proof of previous experience only
C) A bond issued by an accredited surety or insurance company
D) A security deposit with the client
  • 18. Which of the following is a declared policy of the State under RA 11917?
A) To deregulate private security industry
B) D To nationalize all private security agencies
C) To limit the role of private security to non-critical establishments only
D) To strengthen regulation and establish quality standards for private security services
  • 19. Can a private security agency deploy more than 2,000 security professionals under RA 11917?
A) Yes — there is no limit
B) No — limit is 2,000
C) No — limit is 1,000
D) Yes — but only if foreign-owned
  • 20. Which law does RA 11917 reference when allowing issuance of firearms to PSAs under certain conditions?
A) RA 6713 (Code of Conduct and Ethical Standards)
B) RA 7721 (1989 Polaris Law)
C) RA 9165 (Comprehensive Dangerous Drugs Act)
D) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act)
  • 21. Pre-licensing training under RA 11917 may include which of the following courses?
A) Basic Security Guard Course
B) Both A and B
C) None of the above
D) Security Officers Training Course
  • 22. Who among the following may be granted LTO for a Private Security Training Agency (PSTA)?
A) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA
B) Foreign training institutions only
C) Only the PNP itself
D) Any school — public or private — regardless of accreditation
  • 23. True or False: Under RA 11917, a person who renders private security services without a valid LESP may be penalized.
A) False
B) True
  • 24. What happens if a PSA operates with an expired LTO under RA 11917?
A) Fine between ₱50,000 and ₱100,000
B) No penalty
C) Must reapply in 1 year only
D) Automatic cancellation without fine
  • 25. The purpose of RA 11917 includes ensuring that private security personnel are?
A) Allowed to perform law enforcement duties with full police powers
B) Equipped with firearms only
C) Competent and able to complement law enforcement authorities in maintaining peace and order
D) Exempt from training requirements
  • 26. A customer complains about a bag inspection at the gate. As a security officer, what is the most appropriate action to apply customer-relations skills?
A) Ignore the complaint
B) Refer the customer to HR
C) Continue the inspection silently
D) Explain the policy politely and perform the inspection professionally
  • 27. You receive information about a suspicious individual frequently surveying the perimeter. What is your best immediate application of security protocol?
A) Ignore it unless a crime happens
B) Tell other guards verbally only
C) Report to your supervisor and document the behavior
D) Confront him aggressively
  • 28. A fire breaks out in a storage room. What should the security officer apply first?
A) Lock the doors
B) Panic and run
C) Call the media
D) Activate the alarm and assist evacuation
  • 29. A visitor refuses to sign the logbook. What should you apply to handle the situation?
A) Deny entry following access control procedure
B) Let them enter since they look trustworthy
C) Ignore protocol for VIPs
D) Argue with the visitor
  • 30. While on CCTV monitoring, you observe an employee frequently accessing restricted areas. What is your best action?
A) Turn off the CCTV
B) Approach immediately without backup
C) Post the footage online
D) Record the incident and notify the security manager
  • 31. To apply customer service skills during security checks, what should you do?
A) Greet customers and explain procedures briefly
B) Avoid eye contac
C) Perform checks silently
D) Check bags without permission
  • 32. You find a suspicious unattended bag in the lobby. What protocol should you apply?
A) Establish a perimeter and report it
B) Kick it to check for noise
C) Open it immediately
D) Move it to the office
  • 33. An employee reports a lost access card. What should you apply?
A) Ignore the report
B) Tell them to search again
C) Immediately deactivate the card and issue a temporary one
D) Allow entry without identification
  • 34. You are investigating a theft. What is the best application of corporate investigation skills?
A) Gather evidence, review CCTV, and interview witnesses
B) Avoid writing a report
C) Accuse the suspect instantly
D) Destroy old footage
  • 35. During peak hours, people become impatient at security queues. What should you apply?
A) Shout to maintain order
B) Allow skipping procedures
C) Manage lines and communicate delays politely
D) Close the entrance
  • 36. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Manage lines and communicate delays politely
B) Shout to maintain order
C) Allow skipping procedures
D) Close the entrance
  • 37. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Strengthen perimeter checks and brief the team
B) Cancel all work
C) Ignore the intelligence
D) Lock the building permanently
  • 38. While patrolling, a customer asks for directions. What customer-relations skill do you apply?
A) Walk away
B) Tell them it’s not your job
C) Assist them courteously
D) Point them in the wrong direction
  • 39. A co-worker is violating safety rules. What should you apply?
A) Record it for personal use
B) Report and correct the violation professionally
C) Ignore it
D) Join them
  • 40. A delivery truck arrives without prior notice. What protocol should you apply?
A) Let them unload freely
B) Verify documents and confirm with the office
C) Allow entry immediately
D) Ignore standard procedure
  • 41. During an investigation, you must ensure chain of custody. How do you apply this?
A) Let witnesses hold the item
B) Leave evidence unsecured
C) Document all handlers of evidence clearly
D) Pass evidence to anyone available
  • 42. You notice a CCTV camera malfunctioning. What should you apply?
A) Remove the camera yourself
B) Report and record the malfunction immediately
C) Cover it
D) Ignore the issue
  • 43. A VIP arrives at the premises. What should you do to apply security and customer service?
A) Let them pass unscreened
B) Provide guided access within protocol
C) Skip screening
D) Ask for autographs
  • 44. You are assigned to crowd control during an event. What should you apply?
A) Block all exits
B) Guide movements and maintain clear communication
C) Use force immediately
D) Allow overcrowding
  • 45. A colleague provides unverified information about a potential threat. What is the correct application of intelligence validation?
A) Ignore all intel
B) Analyze, verify, and confirm through reliable sources
C) Assume it’s false
D) Spread the information immediately
  • 46. A customer becomes verbally aggressive. What should you apply?
A) Argue back
B) Shout at them
C) Use force immediately
D) Maintain calm and de-escalate the situation
  • 47. During a medical emergency, what should you apply first?
A) Call medical assistance and perform basic first aid
B) Crowd around the victim
C) Move the victim without assessment
D) Panic
  • 48. A suspicious person asks questions about shift schedules. What should you apply?
A) Politely decline and report the inquiry
B) Provide the information
C) Give false details
D) Ignore it
  • 49. You are tasked to secure sensitive corporate documents. What should you apply?
A) Leave documents on your desk
B) Throw them in open bins
C) Use secure storage and control access
D) Give copies to all employees
  • 50. The building receives a bomb threat via phone. What should you apply?
A) Post the threat online
B) Ignore it
C) Keep the caller talking, record details, and notify authorities
D) Hang up immediately
  • 51. You are to apply proper incident reporting. What should you do?
A) Document facts clearly, chronologically, and objectively
B) Delay the report for days
C) Submit reports without details
D) Add personal opinions
  • 52. During a security survey, you are tasked to verify blind spots in a warehouse. Which tool should you apply to best identify these vulnerable areas?
A) CCTV placement map
B) Organizational chart
C) Interview checklist
D) Risk impact matrix
  • 53. To apply physical security principles, which measure should you implement first when securing a newly constructed perimeter fence?
A) Posting emergency hotlines
B) Conducting background checks
C) Installing lighting and surveillance
D) Issuing ID badges
  • 54. When creating a personnel security plan, which of the following actions best applies the principle of “trust but verify”?
A) Conducting random integrity testing
B) Issuing visitor passes
C) Hiring only referrals
D) Providing annual training
  • 55. A company wants to secure confidential files stored in cabinets. Which application of document security is MOST appropriate?
A) Filing documents alphabetically
B) Allowing unlimited photocopying
C) Locking cabinets and applying access logs
D) Placing all documents in open shelves
  • 56. To apply information security protocols in an office with frequent USB use, what should you implement?
A) Disable all USB ports permanently
B) Require encrypted USB devices and scanning
C) Allow all employees to bring any USB
D) Encourage file transfers via social media
  • 57. You are asked to conduct a threat assessment for a bank. Which step best applies risk identification?
A) Preparing the annual budget
B) Drafting job descriptions
C) Listing all possible internal and external threats
D) Evaluating insurance policies
  • 58. To determine which risks should be addressed first, which tool should be applied?
A) Organizational mission-vision
B) Risk probability-impact matrix
C) Security guard post order
D) Duty roster
  • 59. The HR office wants to limit unauthorized access. Which application of personnel security is MOST effective?
A) Enhancing office décor
B) Open-door policy for transparency
C) Implementing biometric access control
D) Allowing visitors to roam freely
  • 60. When applying physical security in parking areas, which measure provides the strongest deterrence?
A) Tree planting
B) Offering valet parking
C) Directional signs only
D) Adequate lighting and patrols
  • 61. During a security survey, you identify several unsecured emergency exits. What should you apply to correct the issue without violating safety codes?
A) Permanently locking all exits
B) Posting "Do Not Enter" signs
C) Installing exit alarms and panic bars
D) Removing all emergency exit doors
  • 62. What is the correct application of document security in a legal department?
A) Keeping confidential files in fire-resistant safes
B) Allowing interns unrestricted access
C) Displaying documents on bulletin boards
D) Using color coding for case folders
  • 63. When applying BCM, which action ensures critical operations continue after a fire?
A) Updating organizational charts
B) Closing all branches temporarily
C) Relocating operations to an alternate site
D) Conducting team building
  • 64. A company wants to prevent tailgating at entrances. Which measure should you apply?
A) Add more posters on policies
B) Install turnstiles with access control
C) Remove all physical barriers
D) Provide umbrellas for visitors
  • 65. In applying risk management, which step follows risk identification?
A) Risk avoidance
B) Risk assessment and analysis
C) Budget allocation
D) Monitoring guards' attendance
  • 66. Which is an applied method to protect information transmitted through email?
A) Using unverified public Wi-Fi
B) Sending drafts to social media inboxes
C) Removing passwords
D) Applying encryption and multi-factor authentication
  • 67. A security manager must ensure all staff understand emergency roles. Which BCM component should be applied?
A) Salary increase program
B) Evacuation and response drills
C) Flexible work hours
D) General orientation lectures
  • 68. When conducting a security survey of a storage facility, what applied method determines the effectiveness of locks?
A) Performing penetration testing
B) Listening to employee complaints
C) Reviewing financial reports
D) Rearranging inventory
  • 69. Applying personnel security, how should temporary workers be managed
A) Give them master keys
B) Trust referrals without checks
C) Issue limited access IDs and monitor activities
D) Allow them full system access
  • 70. When applying document security for classified materials, which marking system should be used?
A) No markings to avoid suspicion
B) Decorative labels
C) “Confidential,” “Secret,” and “Restricted” stamps
D) Color-blind friendly icons
  • 71. To apply information security during remote work, what should employees use?
A) Personal email accounts
B) VPN and secure company devices
C) Any software they prefer
D) Open public Wi-Fi
  • 72. In risk management, which applied strategy reduces the likelihood of intrusion?
A) Reducing guard deployment
B) Eliminating CCTV monitoring
C) Enhancing barriers, lighting, and patrols
D) Increasing the number of blind spots
  • 73. Which BCM action ensures quick restoration of digital records after system failure?
A) Cmm Giving more breaks
B) Playing music during work
C) Removing antivirus software
D) Implementing daily data backups
  • 74. What is the correct application of a security survey to improve guard performance
A) Asking only senior guards for input
B) Looking only at CCTV footage
C) Reviewing guard logs and observing actual posts
D) Ignoring irregularities found
  • 75. To apply physical security for a VIP event, which measure is MOST appropriate?
A) Rely solely on CCTV
B) Allow guests to enter without screening
C) Establish access control points and metal detectors
D) Remove barriers to ensure smooth flow
  • 76. A company must ensure operations continue during a pandemic. Which BCM strategy should be applied?
A) Lay off all employees
B) Lock all offices without notice
C) Cancel all IT support
D) Create a work-from-home and rotation plan
  • 77. Which principle of Crime Prevention Through Environmental Design (CPTED) is best applied when analyzing how transparent store-front windows reduce concealment zones?
A) Maintenance
B) Natural Surveillance
C) Access Control
D) Territorial Reinforcement
  • 78. When evaluating a building layout, which design feature most effectively integrates architectural security with emergency egress analysis?
A) Multiple concealed corridors
B) Clearly marked exit routes
C) High interior walls
D) Decorative landscaping
  • 79. In analyzing urban planning risks, which pattern indicates ineffective zoning related to crime concentration?
A) Commercial districts with regulated lighting
B) High-crime clusters near abandoned structures
C) Residential zones with active barangay patrols
D) Mixed-use areas with pedestrian flow
  • 80. A facility’s main entrance is exposed to direct vehicle access from a public road. Which security concept should be analyzed to mitigate vehicle-borne threats?
A) Employee comfort spaces
B) Perimeter painting
C) Interior signage
D) Blast stand-off distance
  • 81. Which architectural element provides both deterrence and detection when evaluating layered security?
A) Decorative fences
B) Plain glass windows
C) Motion-activated lighting
D) Carpeted hallways
  • 82. When analyzing pathways in urban design, which condition most increases risk according to CPTED?
A) Open parks with community presence
B) Narrow alleys with poor lighting
C) Pathways near visible public spaces
D) Walkways monitored by CCTV
  • 83. A security planner is assessing how building orientation affects nighttime risks. Which factor is most critical?
A) Light distribution and shadow analysis
B) Window size
C) Wall color
D) Rooftop slope
  • 84. In physical security analysis, what does the presence of multiple unlocked access doors indicate?
A) Strong perimeter control
B) Enhanced visitor experience
C) Poor access management
D) High community engagement
  • 85. Which urban planning factor most affects emergency response time analysis?
A) Sidewalk artistry
B) Billboard placement
C) Public decorations
D) Road network connectivity
  • 86. Analyzing the effectiveness of bollards in a building’s perimeter relates to which security function?
A) Soft landscaping
B) Access control
C) Natural surveillance
D) C Information security
  • 87. When assessing a security zone plan, which area is most vulnerable if mixed with unrestricted public space?
A) Core administrative area
B) Outdoor recreation area
C) Parking façade
D) Reception lobby
  • 88. A facility uses high walls but lacks surveillance. What analysis best explains this weakness?
A) Walls encourage community bonding
B) Walls improve natural lighting
C) High barriers eliminate all threats
D) Walls without monitoring create blind spots
  • 89. In analyzing building materials for security, laminated glass is preferred because it:
A) Reduces electricity consumption
B) Provides resistance to forced entry
C) Breaks easily for ventilation
D) Fades sunlight exposure
  • 90. When analyzing urban crime patterns, which environmental factor often correlates with increased vandalism?
A) Active commercial zones
B) Areas with community events
C) High-visibility parks
D) Areas with poor maintenance ("broken windows")
  • 91. If a facility has excellent CCTV but poor lighting, what can be concluded?
A) CCTV compensates fully for lighting
B) CCTV becomes ineffective due to darkness
C) CCTV makes lighting unnecessary
D) CCTV automatically brightens footage
  • 92. A building entrance facing a blind corner increases risk because it reduces:
A) Interior temperature
B) Employee comfort
C) Structural stability
D) Visibility for approaching threats
  • 93. Analyzing pedestrian traffic flow is essential in security planning because it:
A) Helps determine paint colors
B) Reduces real estate value
C) Identifies crowding that may mask hostile intent
D) Improves interior aesthetics
  • 94. In physical security evaluation, which combination increases intrusion risk?
A) High walls + intrusion alarms
B) D CCTVs + guard patrols
C) Hidden entrances + poor lighting
D) Glass doors + reinforced locks
  • 95. Which urban design flaw most contributes to crime displacement analysis?
A) Pedestrian-friendly walkways
B) Hidden escape routes in informal settlements
C) Well-planned zoning
D) Overly wide roads
  • 96. The absence of a defined perimeter in architectural design makes it most difficult to analyze:
A) Visitor screening points
B) Window design
C) Furniture placement
D) Employee morale
  • 97. When analyzing physical barriers, which factor most determines their effectiveness?
A) Ability to blend with landscape
B) Height, strength, and placement
C) Aesthetic quality
D) Color scheme
  • 98. A poorly lit parking area is high-risk primarily because it reduces:
A) Employee punctuality
B) Natural surveillance opportunities
C) Landscaping efficiency
D) Economic viability
  • 99. What can be inferred when pedestrian walkways intersect with high-speed traffic lanes?
A) High environmental safety
B) Elevated hazard and accident risk
C) Improved traffic efficiency
D) Increased social interaction
  • 100. If a building uses reflective surfaces at entrances, analysis shows it enhances security by improving:
A) Noise reduction
B) Temperature control
C) Decorative appeal
D) Visibility of approaching individuals
Created with That Quiz — the site for test creation and grading in math and other subjects.