A) Private Security Services Industry Act B) Private Security Agencies Act C) Private Detective Act D) Security Guard Regulation Act
A) License to Operate B) License to Officiate C) License to Observe D) License to Organize
A) License to Exercise Security Profession B) License to Establish Security Profession C) License to Employ Security Professionals D) License to Enlist Security Personnel
A) RA 7031 B) RA 9184 C) RA 10591 D) RA 5487
A) Department of Labor and Employment (DOLE) B) Chief of the Philippine National Police (PNP) or authorized representative C) Department of Interior and Local Government (DILG) D) Department of Justice
A) Only K9-unit handlers B) Any person or juridical entity that recruits/security guards for hire C) Any government police force D) Only persons providing alarm system monitoring
A) Must undergo pre-licensing training program B) Must be at least 30 years old C) None — license is automatic D) Must own a security agency
A) 3 years B) 5 years C) 2 years D) 4 years
A) 25% B) 20% C) 15% D) 10%
A) Yes, but only foreign-owned ones B) No, juridical entities are excluded C) No, only individuals can apply D) Yes, if wholly Filipino-owned and controlled
A) CCTV hardware suppliers and operations B) Government police patrol units C) Security training agencies D) Private detective agencies
A) True B) False
A) Using force to influence elections B) Hiring only Filipino citizens C) Operating without firearms D) Charging administrative fee of 20%
A) Pre-Licensing Training Programs B) On-the-job training only C) No training required D) D.Training only for K9 handlers
A) Any person who works as a guard without license B) Persons issued a valid LESP after satisfying requirements C) Only members of the Armed Forces of the Philippines D) Government investigators on
A) All of the above B) Security guards and watchmen C) Private investigators and K9 handlers D) Security consultants and system designers
A) Nothing — just a form B) Proof of previous experience only C) A bond issued by an accredited surety or insurance company D) A security deposit with the client
A) To deregulate private security industry B) D To nationalize all private security agencies C) To limit the role of private security to non-critical establishments only D) To strengthen regulation and establish quality standards for private security services
A) Yes — there is no limit B) No — limit is 2,000 C) No — limit is 1,000 D) Yes — but only if foreign-owned
A) RA 6713 (Code of Conduct and Ethical Standards) B) RA 7721 (1989 Polaris Law) C) RA 9165 (Comprehensive Dangerous Drugs Act) D) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act)
A) Basic Security Guard Course B) Both A and B C) None of the above D) Security Officers Training Course
A) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA B) Foreign training institutions only C) Only the PNP itself D) Any school — public or private — regardless of accreditation
A) False B) True
A) Fine between ₱50,000 and ₱100,000 B) No penalty C) Must reapply in 1 year only D) Automatic cancellation without fine
A) Allowed to perform law enforcement duties with full police powers B) Equipped with firearms only C) Competent and able to complement law enforcement authorities in maintaining peace and order D) Exempt from training requirements
A) Ignore the complaint B) Refer the customer to HR C) Continue the inspection silently D) Explain the policy politely and perform the inspection professionally
A) Ignore it unless a crime happens B) Tell other guards verbally only C) Report to your supervisor and document the behavior D) Confront him aggressively
A) Lock the doors B) Panic and run C) Call the media D) Activate the alarm and assist evacuation
A) Deny entry following access control procedure B) Let them enter since they look trustworthy C) Ignore protocol for VIPs D) Argue with the visitor
A) Turn off the CCTV B) Approach immediately without backup C) Post the footage online D) Record the incident and notify the security manager
A) Greet customers and explain procedures briefly B) Avoid eye contac C) Perform checks silently D) Check bags without permission
A) Establish a perimeter and report it B) Kick it to check for noise C) Open it immediately D) Move it to the office
A) Ignore the report B) Tell them to search again C) Immediately deactivate the card and issue a temporary one D) Allow entry without identification
A) Gather evidence, review CCTV, and interview witnesses B) Avoid writing a report C) Accuse the suspect instantly D) Destroy old footage
A) Shout to maintain order B) Allow skipping procedures C) Manage lines and communicate delays politely D) Close the entrance
A) Manage lines and communicate delays politely B) Shout to maintain order C) Allow skipping procedures D) Close the entrance
A) Strengthen perimeter checks and brief the team B) Cancel all work C) Ignore the intelligence D) Lock the building permanently
A) Walk away B) Tell them it’s not your job C) Assist them courteously D) Point them in the wrong direction
A) Record it for personal use B) Report and correct the violation professionally C) Ignore it D) Join them
A) Let them unload freely B) Verify documents and confirm with the office C) Allow entry immediately D) Ignore standard procedure
A) Let witnesses hold the item B) Leave evidence unsecured C) Document all handlers of evidence clearly D) Pass evidence to anyone available
A) Remove the camera yourself B) Report and record the malfunction immediately C) Cover it D) Ignore the issue
A) Let them pass unscreened B) Provide guided access within protocol C) Skip screening D) Ask for autographs
A) Block all exits B) Guide movements and maintain clear communication C) Use force immediately D) Allow overcrowding
A) Ignore all intel B) Analyze, verify, and confirm through reliable sources C) Assume it’s false D) Spread the information immediately
A) Argue back B) Shout at them C) Use force immediately D) Maintain calm and de-escalate the situation
A) Call medical assistance and perform basic first aid B) Crowd around the victim C) Move the victim without assessment D) Panic
A) Politely decline and report the inquiry B) Provide the information C) Give false details D) Ignore it
A) Leave documents on your desk B) Throw them in open bins C) Use secure storage and control access D) Give copies to all employees
A) Post the threat online B) Ignore it C) Keep the caller talking, record details, and notify authorities D) Hang up immediately
A) Document facts clearly, chronologically, and objectively B) Delay the report for days C) Submit reports without details D) Add personal opinions
A) CCTV placement map B) Organizational chart C) Interview checklist D) Risk impact matrix
A) Posting emergency hotlines B) Conducting background checks C) Installing lighting and surveillance D) Issuing ID badges
A) Conducting random integrity testing B) Issuing visitor passes C) Hiring only referrals D) Providing annual training
A) Filing documents alphabetically B) Allowing unlimited photocopying C) Locking cabinets and applying access logs D) Placing all documents in open shelves
A) Disable all USB ports permanently B) Require encrypted USB devices and scanning C) Allow all employees to bring any USB D) Encourage file transfers via social media
A) Preparing the annual budget B) Drafting job descriptions C) Listing all possible internal and external threats D) Evaluating insurance policies
A) Organizational mission-vision B) Risk probability-impact matrix C) Security guard post order D) Duty roster
A) Enhancing office décor B) Open-door policy for transparency C) Implementing biometric access control D) Allowing visitors to roam freely
A) Tree planting B) Offering valet parking C) Directional signs only D) Adequate lighting and patrols
A) Permanently locking all exits B) Posting "Do Not Enter" signs C) Installing exit alarms and panic bars D) Removing all emergency exit doors
A) Keeping confidential files in fire-resistant safes B) Allowing interns unrestricted access C) Displaying documents on bulletin boards D) Using color coding for case folders
A) Updating organizational charts B) Closing all branches temporarily C) Relocating operations to an alternate site D) Conducting team building
A) Add more posters on policies B) Install turnstiles with access control C) Remove all physical barriers D) Provide umbrellas for visitors
A) Risk avoidance B) Risk assessment and analysis C) Budget allocation D) Monitoring guards' attendance
A) Using unverified public Wi-Fi B) Sending drafts to social media inboxes C) Removing passwords D) Applying encryption and multi-factor authentication
A) Salary increase program B) Evacuation and response drills C) Flexible work hours D) General orientation lectures
A) Performing penetration testing B) Listening to employee complaints C) Reviewing financial reports D) Rearranging inventory
A) Give them master keys B) Trust referrals without checks C) Issue limited access IDs and monitor activities D) Allow them full system access
A) No markings to avoid suspicion B) Decorative labels C) “Confidential,” “Secret,” and “Restricted” stamps D) Color-blind friendly icons
A) Personal email accounts B) VPN and secure company devices C) Any software they prefer D) Open public Wi-Fi
A) Reducing guard deployment B) Eliminating CCTV monitoring C) Enhancing barriers, lighting, and patrols D) Increasing the number of blind spots
A) Cmm Giving more breaks B) Playing music during work C) Removing antivirus software D) Implementing daily data backups
A) Asking only senior guards for input B) Looking only at CCTV footage C) Reviewing guard logs and observing actual posts D) Ignoring irregularities found
A) Rely solely on CCTV B) Allow guests to enter without screening C) Establish access control points and metal detectors D) Remove barriers to ensure smooth flow
A) Lay off all employees B) Lock all offices without notice C) Cancel all IT support D) Create a work-from-home and rotation plan
A) Maintenance B) Natural Surveillance C) Access Control D) Territorial Reinforcement
A) Multiple concealed corridors B) Clearly marked exit routes C) High interior walls D) Decorative landscaping
A) Commercial districts with regulated lighting B) High-crime clusters near abandoned structures C) Residential zones with active barangay patrols D) Mixed-use areas with pedestrian flow
A) Employee comfort spaces B) Perimeter painting C) Interior signage D) Blast stand-off distance
A) Decorative fences B) Plain glass windows C) Motion-activated lighting D) Carpeted hallways
A) Open parks with community presence B) Narrow alleys with poor lighting C) Pathways near visible public spaces D) Walkways monitored by CCTV
A) Light distribution and shadow analysis B) Window size C) Wall color D) Rooftop slope
A) Strong perimeter control B) Enhanced visitor experience C) Poor access management D) High community engagement
A) Sidewalk artistry B) Billboard placement C) Public decorations D) Road network connectivity
A) Soft landscaping B) Access control C) Natural surveillance D) C Information security
A) Core administrative area B) Outdoor recreation area C) Parking façade D) Reception lobby
A) Walls encourage community bonding B) Walls improve natural lighting C) High barriers eliminate all threats D) Walls without monitoring create blind spots
A) Reduces electricity consumption B) Provides resistance to forced entry C) Breaks easily for ventilation D) Fades sunlight exposure
A) Active commercial zones B) Areas with community events C) High-visibility parks D) Areas with poor maintenance ("broken windows")
A) CCTV compensates fully for lighting B) CCTV becomes ineffective due to darkness C) CCTV makes lighting unnecessary D) CCTV automatically brightens footage
A) Interior temperature B) Employee comfort C) Structural stability D) Visibility for approaching threats
A) Helps determine paint colors B) Reduces real estate value C) Identifies crowding that may mask hostile intent D) Improves interior aesthetics
A) High walls + intrusion alarms B) D CCTVs + guard patrols C) Hidden entrances + poor lighting D) Glass doors + reinforced locks
A) Pedestrian-friendly walkways B) Hidden escape routes in informal settlements C) Well-planned zoning D) Overly wide roads
A) Visitor screening points B) Window design C) Furniture placement D) Employee morale
A) Ability to blend with landscape B) Height, strength, and placement C) Aesthetic quality D) Color scheme
A) Employee punctuality B) Natural surveillance opportunities C) Landscaping efficiency D) Economic viability
A) High environmental safety B) Elevated hazard and accident risk C) Improved traffic efficiency D) Increased social interaction
A) Noise reduction B) Temperature control C) Decorative appeal D) Visibility of approaching individuals |