A) Private Detective Act B) Private Security Services Industry Act C) Security Guard Regulation Act D) Private Security Agencies Act
A) License to Operate B) License to Organize C) License to Officiate D) License to Observe
A) License to Establish Security Profession B) License to Employ Security Professionals C) License to Exercise Security Profession D) License to Enlist Security Personnel
A) RA 7031 B) RA 5487 C) RA 9184 D) RA 10591
A) Department of Labor and Employment (DOLE) B) Department of Interior and Local Government (DILG) C) Department of Justice D) Chief of the Philippine National Police (PNP) or authorized representative
A) Any person or juridical entity that recruits/security guards for hire B) Only K9-unit handlers C) Any government police force D) Only persons providing alarm system monitoring
A) Must undergo pre-licensing training program B) Must own a security agency C) None — license is automatic D) Must be at least 30 years old
A) 2 years B) 5 years C) 3 years D) 4 years
A) 20% B) 15% C) 10% D) 25%
A) Yes, but only foreign-owned ones B) No, only individuals can apply C) No, juridical entities are excluded D) Yes, if wholly Filipino-owned and controlled
A) CCTV hardware suppliers and operations B) Government police patrol units C) Private detective agencies D) Security training agencies
A) False B) True
A) Operating without firearms B) Hiring only Filipino citizens C) Charging administrative fee of 20% D) Using force to influence elections
A) D.Training only for K9 handlers B) Pre-Licensing Training Programs C) On-the-job training only D) No training required
A) Government investigators on B) Persons issued a valid LESP after satisfying requirements C) Any person who works as a guard without license D) Only members of the Armed Forces of the Philippines
A) Security consultants and system designers B) Security guards and watchmen C) All of the above D) Private investigators and K9 handlers
A) A security deposit with the client B) A bond issued by an accredited surety or insurance company C) Nothing — just a form D) Proof of previous experience only
A) D To nationalize all private security agencies B) To limit the role of private security to non-critical establishments only C) To strengthen regulation and establish quality standards for private security services D) To deregulate private security industry
A) No — limit is 1,000 B) No — limit is 2,000 C) Yes — but only if foreign-owned D) Yes — there is no limit
A) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act) B) RA 7721 (1989 Polaris Law) C) RA 9165 (Comprehensive Dangerous Drugs Act) D) RA 6713 (Code of Conduct and Ethical Standards)
A) Security Officers Training Course B) None of the above C) Both A and B D) Basic Security Guard Course
A) Foreign training institutions only B) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA C) Any school — public or private — regardless of accreditation D) Only the PNP itself
A) False B) True
A) Automatic cancellation without fine B) Must reapply in 1 year only C) No penalty D) Fine between ₱50,000 and ₱100,000
A) Competent and able to complement law enforcement authorities in maintaining peace and order B) Exempt from training requirements C) Equipped with firearms only D) Allowed to perform law enforcement duties with full police powers
A) Explain the policy politely and perform the inspection professionally B) Ignore the complaint C) Continue the inspection silently D) Refer the customer to HR
A) Confront him aggressively B) Tell other guards verbally only C) Report to your supervisor and document the behavior D) Ignore it unless a crime happens
A) Call the media B) Panic and run C) Lock the doors D) Activate the alarm and assist evacuation
A) Argue with the visitor B) Ignore protocol for VIPs C) Let them enter since they look trustworthy D) Deny entry following access control procedure
A) Post the footage online B) Turn off the CCTV C) Approach immediately without backup D) Record the incident and notify the security manager
A) Greet customers and explain procedures briefly B) Avoid eye contac C) Check bags without permission D) Perform checks silently
A) Move it to the office B) Kick it to check for noise C) Establish a perimeter and report it D) Open it immediately
A) Immediately deactivate the card and issue a temporary one B) Allow entry without identification C) Ignore the report D) Tell them to search again
A) Accuse the suspect instantly B) Gather evidence, review CCTV, and interview witnesses C) Destroy old footage D) Avoid writing a report
A) Close the entrance B) Shout to maintain order C) Allow skipping procedures D) Manage lines and communicate delays politely
A) Allow skipping procedures B) Manage lines and communicate delays politely C) Shout to maintain order D) Close the entrance
A) Strengthen perimeter checks and brief the team B) Cancel all work C) Ignore the intelligence D) Lock the building permanently
A) Assist them courteously B) Tell them it’s not your job C) Walk away D) Point them in the wrong direction
A) Ignore it B) Join them C) Record it for personal use D) Report and correct the violation professionally
A) Verify documents and confirm with the office B) Allow entry immediately C) Let them unload freely D) Ignore standard procedure
A) Leave evidence unsecured B) Pass evidence to anyone available C) Document all handlers of evidence clearly D) Let witnesses hold the item
A) Cover it B) Ignore the issue C) Report and record the malfunction immediately D) Remove the camera yourself
A) Provide guided access within protocol B) Skip screening C) Let them pass unscreened D) Ask for autographs
A) Block all exits B) Guide movements and maintain clear communication C) Use force immediately D) Allow overcrowding
A) Spread the information immediately B) Analyze, verify, and confirm through reliable sources C) Ignore all intel D) Assume it’s false
A) Argue back B) Use force immediately C) Shout at them D) Maintain calm and de-escalate the situation
A) Call medical assistance and perform basic first aid B) Crowd around the victim C) Panic D) Move the victim without assessment
A) Politely decline and report the inquiry B) Provide the information C) Give false details D) Ignore it
A) Give copies to all employees B) Leave documents on your desk C) Throw them in open bins D) Use secure storage and control access
A) Post the threat online B) Keep the caller talking, record details, and notify authorities C) Hang up immediately D) Ignore it
A) Add personal opinions B) Document facts clearly, chronologically, and objectively C) Submit reports without details D) Delay the report for days
A) Organizational chart B) Interview checklist C) CCTV placement map D) Risk impact matrix
A) Installing lighting and surveillance B) Posting emergency hotlines C) Issuing ID badges D) Conducting background checks
A) Providing annual training B) Conducting random integrity testing C) Issuing visitor passes D) Hiring only referrals
A) Placing all documents in open shelves B) Locking cabinets and applying access logs C) Filing documents alphabetically D) Allowing unlimited photocopying
A) Require encrypted USB devices and scanning B) Encourage file transfers via social media C) Allow all employees to bring any USB D) Disable all USB ports permanently
A) Evaluating insurance policies B) Listing all possible internal and external threats C) Drafting job descriptions D) Preparing the annual budget
A) Risk probability-impact matrix B) Organizational mission-vision C) Duty roster D) Security guard post order
A) Allowing visitors to roam freely B) Enhancing office décor C) Implementing biometric access control D) Open-door policy for transparency
A) Offering valet parking B) Adequate lighting and patrols C) Tree planting D) Directional signs only
A) Posting "Do Not Enter" signs B) Removing all emergency exit doors C) Permanently locking all exits D) Installing exit alarms and panic bars
A) Using color coding for case folders B) Displaying documents on bulletin boards C) Keeping confidential files in fire-resistant safes D) Allowing interns unrestricted access
A) Relocating operations to an alternate site B) Conducting team building C) Closing all branches temporarily D) Updating organizational charts
A) Install turnstiles with access control B) Add more posters on policies C) Remove all physical barriers D) Provide umbrellas for visitors
A) Risk avoidance B) Risk assessment and analysis C) Budget allocation D) Monitoring guards' attendance
A) Applying encryption and multi-factor authentication B) Removing passwords C) Sending drafts to social media inboxes D) Using unverified public Wi-Fi
A) Salary increase program B) Flexible work hours C) Evacuation and response drills D) General orientation lectures
A) Listening to employee complaints B) Performing penetration testing C) Rearranging inventory D) Reviewing financial reports
A) Give them master keys B) Trust referrals without checks C) Allow them full system access D) Issue limited access IDs and monitor activities
A) No markings to avoid suspicion B) Color-blind friendly icons C) “Confidential,” “Secret,” and “Restricted” stamps D) Decorative labels
A) Open public Wi-Fi B) Personal email accounts C) Any software they prefer D) VPN and secure company devices
A) Enhancing barriers, lighting, and patrols B) Eliminating CCTV monitoring C) Increasing the number of blind spots D) Reducing guard deployment
A) Cmm Giving more breaks B) Playing music during work C) Implementing daily data backups D) Removing antivirus software
A) Reviewing guard logs and observing actual posts B) Asking only senior guards for input C) Looking only at CCTV footage D) Ignoring irregularities found
A) Remove barriers to ensure smooth flow B) Allow guests to enter without screening C) Establish access control points and metal detectors D) Rely solely on CCTV
A) Create a work-from-home and rotation plan B) Lay off all employees C) Lock all offices without notice D) Cancel all IT support
A) Territorial Reinforcement B) Access Control C) Maintenance D) Natural Surveillance
A) Multiple concealed corridors B) Decorative landscaping C) Clearly marked exit routes D) High interior walls
A) Commercial districts with regulated lighting B) High-crime clusters near abandoned structures C) Mixed-use areas with pedestrian flow D) Residential zones with active barangay patrols
A) Blast stand-off distance B) Perimeter painting C) Interior signage D) Employee comfort spaces
A) Motion-activated lighting B) Decorative fences C) Carpeted hallways D) Plain glass windows
A) Open parks with community presence B) Walkways monitored by CCTV C) Narrow alleys with poor lighting D) Pathways near visible public spaces
A) Rooftop slope B) Window size C) Wall color D) Light distribution and shadow analysis
A) High community engagement B) Enhanced visitor experience C) Strong perimeter control D) Poor access management
A) Public decorations B) Sidewalk artistry C) Road network connectivity D) Billboard placement
A) Natural surveillance B) Soft landscaping C) Access control D) C Information security
A) Parking façade B) Reception lobby C) Core administrative area D) Outdoor recreation area
A) Walls improve natural lighting B) Walls without monitoring create blind spots C) High barriers eliminate all threats D) Walls encourage community bonding
A) Fades sunlight exposure B) Provides resistance to forced entry C) Reduces electricity consumption D) Breaks easily for ventilation
A) Active commercial zones B) High-visibility parks C) Areas with poor maintenance ("broken windows") D) Areas with community events
A) CCTV compensates fully for lighting B) CCTV makes lighting unnecessary C) CCTV becomes ineffective due to darkness D) CCTV automatically brightens footage
A) Interior temperature B) Structural stability C) Employee comfort D) Visibility for approaching threats
A) Identifies crowding that may mask hostile intent B) Helps determine paint colors C) Reduces real estate value D) Improves interior aesthetics
A) Glass doors + reinforced locks B) Hidden entrances + poor lighting C) D CCTVs + guard patrols D) High walls + intrusion alarms
A) Well-planned zoning B) Overly wide roads C) Pedestrian-friendly walkways D) Hidden escape routes in informal settlements
A) Window design B) Furniture placement C) Visitor screening points D) Employee morale
A) Color scheme B) Ability to blend with landscape C) Height, strength, and placement D) Aesthetic quality
A) Employee punctuality B) Natural surveillance opportunities C) Landscaping efficiency D) Economic viability
A) High environmental safety B) Increased social interaction C) Improved traffic efficiency D) Elevated hazard and accident risk
A) Visibility of approaching individuals B) Noise reduction C) Decorative appeal D) Temperature control |