ThatQuiz Test Library Take this test now
LEA3-ISAMANA
Contributed by: Three
  • 1. What is the short title of RA 11917?
A) Private Detective Act
B) Private Security Services Industry Act
C) Security Guard Regulation Act
D) Private Security Agencies Act
  • 2. What does the acronym “LTO” stand for in RA 11917?
A) License to Operate
B) License to Organize
C) License to Officiate
D) License to Observe
  • 3. What does “LESP” refer to under RA 11917?
A) License to Establish Security Profession
B) License to Employ Security Professionals
C) License to Exercise Security Profession
D) License to Enlist Security Personnel
  • 4. Which existing law is repealed by RA 11917?
A) RA 7031
B) RA 5487
C) RA 9184
D) RA 10591
  • 5. Who issues the LTO or LESP under RA 11917?
A) Department of Labor and Employment (DOLE)
B) Department of Interior and Local Government (DILG)
C) Department of Justice
D) Chief of the Philippine National Police (PNP) or authorized representative
  • 6. Which of the following is considered a “Private Security Agency (PSA)” under RA 11917?
A) Any person or juridical entity that recruits/security guards for hire
B) Only K9-unit handlers
C) Any government police force
D) Only persons providing alarm system monitoring
  • 7. What is required before a person can be granted a LESP?
A) Must undergo pre-licensing training program
B) Must own a security agency
C) None — license is automatic
D) Must be at least 30 years old
  • 8. How long is a valid LESP issued under RA 11917 (subject to renewal)?
A) 2 years
B) 5 years
C) 3 years
D) 4 years
  • 9. What is the minimum administrative fee that a PSA may charge its clients (as a percentage of contract cost)?
A) 20%
B) 15%
C) 10%
D) 25%
  • 10. Can a juridical entity (corporation) apply for a License to Operate (LTO) under RA 11917?
A) Yes, but only foreign-owned ones
B) No, only individuals can apply
C) No, juridical entities are excluded
D) Yes, if wholly Filipino-owned and controlled
  • 11. Which among the following is NOT part of the “Private Security Industry” as defined in RA 11917?
A) CCTV hardware suppliers and operations
B) Government police patrol units
C) Private detective agencies
D) Security training agencies
  • 12. True or False: A PSA may remain valid indefinitely once it obtains an LTO.
A) False
B) True
  • 13. Which of the following is a ground for cancellation or suspension of a PSA’s license under RA 11917?
A) Operating without firearms
B) Hiring only Filipino citizens
C) Charging administrative fee of 20%
D) Using force to influence elections
  • 14. What kind of training programs does RA 11917 require before practice?
A) D.Training only for K9 handlers
B) Pre-Licensing Training Programs
C) On-the-job training only
D) No training required
  • 15. Under RA 11917, who qualifies as a “Private Security Professional (PSP)”?
A) Government investigators on
B) Persons issued a valid LESP after satisfying requirements
C) Any person who works as a guard without license
D) Only members of the Armed Forces of the Philippines
  • 16. Which of the following is included among the possible roles under PSP as defined by RA 11917?
A) Security consultants and system designers
B) Security guards and watchmen
C) All of the above
D) Private investigators and K9 handlers
  • 17. What must accompany an application for LTO under RA 11917?
A) A security deposit with the client
B) A bond issued by an accredited surety or insurance company
C) Nothing — just a form
D) Proof of previous experience only
  • 18. Which of the following is a declared policy of the State under RA 11917?
A) D To nationalize all private security agencies
B) To limit the role of private security to non-critical establishments only
C) To strengthen regulation and establish quality standards for private security services
D) To deregulate private security industry
  • 19. Can a private security agency deploy more than 2,000 security professionals under RA 11917?
A) No — limit is 1,000
B) No — limit is 2,000
C) Yes — but only if foreign-owned
D) Yes — there is no limit
  • 20. Which law does RA 11917 reference when allowing issuance of firearms to PSAs under certain conditions?
A) RA 10591 (Comprehensive Firearms and Ammunition Regulation Act)
B) RA 7721 (1989 Polaris Law)
C) RA 9165 (Comprehensive Dangerous Drugs Act)
D) RA 6713 (Code of Conduct and Ethical Standards)
  • 21. Pre-licensing training under RA 11917 may include which of the following courses?
A) Security Officers Training Course
B) None of the above
C) Both A and B
D) Basic Security Guard Course
  • 22. Who among the following may be granted LTO for a Private Security Training Agency (PSTA)?
A) Foreign training institutions only
B) Only a training school, institute, academy or educational institution offering approved courses by PNP or accredited by TESDA
C) Any school — public or private — regardless of accreditation
D) Only the PNP itself
  • 23. True or False: Under RA 11917, a person who renders private security services without a valid LESP may be penalized.
A) False
B) True
  • 24. What happens if a PSA operates with an expired LTO under RA 11917?
A) Automatic cancellation without fine
B) Must reapply in 1 year only
C) No penalty
D) Fine between ₱50,000 and ₱100,000
  • 25. The purpose of RA 11917 includes ensuring that private security personnel are?
A) Competent and able to complement law enforcement authorities in maintaining peace and order
B) Exempt from training requirements
C) Equipped with firearms only
D) Allowed to perform law enforcement duties with full police powers
  • 26. A customer complains about a bag inspection at the gate. As a security officer, what is the most appropriate action to apply customer-relations skills?
A) Explain the policy politely and perform the inspection professionally
B) Ignore the complaint
C) Continue the inspection silently
D) Refer the customer to HR
  • 27. You receive information about a suspicious individual frequently surveying the perimeter. What is your best immediate application of security protocol?
A) Confront him aggressively
B) Tell other guards verbally only
C) Report to your supervisor and document the behavior
D) Ignore it unless a crime happens
  • 28. A fire breaks out in a storage room. What should the security officer apply first?
A) Call the media
B) Panic and run
C) Lock the doors
D) Activate the alarm and assist evacuation
  • 29. A visitor refuses to sign the logbook. What should you apply to handle the situation?
A) Argue with the visitor
B) Ignore protocol for VIPs
C) Let them enter since they look trustworthy
D) Deny entry following access control procedure
  • 30. While on CCTV monitoring, you observe an employee frequently accessing restricted areas. What is your best action?
A) Post the footage online
B) Turn off the CCTV
C) Approach immediately without backup
D) Record the incident and notify the security manager
  • 31. To apply customer service skills during security checks, what should you do?
A) Greet customers and explain procedures briefly
B) Avoid eye contac
C) Check bags without permission
D) Perform checks silently
  • 32. You find a suspicious unattended bag in the lobby. What protocol should you apply?
A) Move it to the office
B) Kick it to check for noise
C) Establish a perimeter and report it
D) Open it immediately
  • 33. An employee reports a lost access card. What should you apply?
A) Immediately deactivate the card and issue a temporary one
B) Allow entry without identification
C) Ignore the report
D) Tell them to search again
  • 34. You are investigating a theft. What is the best application of corporate investigation skills?
A) Accuse the suspect instantly
B) Gather evidence, review CCTV, and interview witnesses
C) Destroy old footage
D) Avoid writing a report
  • 35. During peak hours, people become impatient at security queues. What should you apply?
A) Close the entrance
B) Shout to maintain order
C) Allow skipping procedures
D) Manage lines and communicate delays politely
  • 36. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Allow skipping procedures
B) Manage lines and communicate delays politely
C) Shout to maintain order
D) Close the entrance
  • 37. You receive intelligence that a protest group may target the building. What action applies proper risk mitigation?
A) Strengthen perimeter checks and brief the team
B) Cancel all work
C) Ignore the intelligence
D) Lock the building permanently
  • 38. While patrolling, a customer asks for directions. What customer-relations skill do you apply?
A) Assist them courteously
B) Tell them it’s not your job
C) Walk away
D) Point them in the wrong direction
  • 39. A co-worker is violating safety rules. What should you apply?
A) Ignore it
B) Join them
C) Record it for personal use
D) Report and correct the violation professionally
  • 40. A delivery truck arrives without prior notice. What protocol should you apply?
A) Verify documents and confirm with the office
B) Allow entry immediately
C) Let them unload freely
D) Ignore standard procedure
  • 41. During an investigation, you must ensure chain of custody. How do you apply this?
A) Leave evidence unsecured
B) Pass evidence to anyone available
C) Document all handlers of evidence clearly
D) Let witnesses hold the item
  • 42. You notice a CCTV camera malfunctioning. What should you apply?
A) Cover it
B) Ignore the issue
C) Report and record the malfunction immediately
D) Remove the camera yourself
  • 43. A VIP arrives at the premises. What should you do to apply security and customer service?
A) Provide guided access within protocol
B) Skip screening
C) Let them pass unscreened
D) Ask for autographs
  • 44. You are assigned to crowd control during an event. What should you apply?
A) Block all exits
B) Guide movements and maintain clear communication
C) Use force immediately
D) Allow overcrowding
  • 45. A colleague provides unverified information about a potential threat. What is the correct application of intelligence validation?
A) Spread the information immediately
B) Analyze, verify, and confirm through reliable sources
C) Ignore all intel
D) Assume it’s false
  • 46. A customer becomes verbally aggressive. What should you apply?
A) Argue back
B) Use force immediately
C) Shout at them
D) Maintain calm and de-escalate the situation
  • 47. During a medical emergency, what should you apply first?
A) Call medical assistance and perform basic first aid
B) Crowd around the victim
C) Panic
D) Move the victim without assessment
  • 48. A suspicious person asks questions about shift schedules. What should you apply?
A) Politely decline and report the inquiry
B) Provide the information
C) Give false details
D) Ignore it
  • 49. You are tasked to secure sensitive corporate documents. What should you apply?
A) Give copies to all employees
B) Leave documents on your desk
C) Throw them in open bins
D) Use secure storage and control access
  • 50. The building receives a bomb threat via phone. What should you apply?
A) Post the threat online
B) Keep the caller talking, record details, and notify authorities
C) Hang up immediately
D) Ignore it
  • 51. You are to apply proper incident reporting. What should you do?
A) Add personal opinions
B) Document facts clearly, chronologically, and objectively
C) Submit reports without details
D) Delay the report for days
  • 52. During a security survey, you are tasked to verify blind spots in a warehouse. Which tool should you apply to best identify these vulnerable areas?
A) Organizational chart
B) Interview checklist
C) CCTV placement map
D) Risk impact matrix
  • 53. To apply physical security principles, which measure should you implement first when securing a newly constructed perimeter fence?
A) Installing lighting and surveillance
B) Posting emergency hotlines
C) Issuing ID badges
D) Conducting background checks
  • 54. When creating a personnel security plan, which of the following actions best applies the principle of “trust but verify”?
A) Providing annual training
B) Conducting random integrity testing
C) Issuing visitor passes
D) Hiring only referrals
  • 55. A company wants to secure confidential files stored in cabinets. Which application of document security is MOST appropriate?
A) Placing all documents in open shelves
B) Locking cabinets and applying access logs
C) Filing documents alphabetically
D) Allowing unlimited photocopying
  • 56. To apply information security protocols in an office with frequent USB use, what should you implement?
A) Require encrypted USB devices and scanning
B) Encourage file transfers via social media
C) Allow all employees to bring any USB
D) Disable all USB ports permanently
  • 57. You are asked to conduct a threat assessment for a bank. Which step best applies risk identification?
A) Evaluating insurance policies
B) Listing all possible internal and external threats
C) Drafting job descriptions
D) Preparing the annual budget
  • 58. To determine which risks should be addressed first, which tool should be applied?
A) Risk probability-impact matrix
B) Organizational mission-vision
C) Duty roster
D) Security guard post order
  • 59. The HR office wants to limit unauthorized access. Which application of personnel security is MOST effective?
A) Allowing visitors to roam freely
B) Enhancing office décor
C) Implementing biometric access control
D) Open-door policy for transparency
  • 60. When applying physical security in parking areas, which measure provides the strongest deterrence?
A) Offering valet parking
B) Adequate lighting and patrols
C) Tree planting
D) Directional signs only
  • 61. During a security survey, you identify several unsecured emergency exits. What should you apply to correct the issue without violating safety codes?
A) Posting "Do Not Enter" signs
B) Removing all emergency exit doors
C) Permanently locking all exits
D) Installing exit alarms and panic bars
  • 62. What is the correct application of document security in a legal department?
A) Using color coding for case folders
B) Displaying documents on bulletin boards
C) Keeping confidential files in fire-resistant safes
D) Allowing interns unrestricted access
  • 63. When applying BCM, which action ensures critical operations continue after a fire?
A) Relocating operations to an alternate site
B) Conducting team building
C) Closing all branches temporarily
D) Updating organizational charts
  • 64. A company wants to prevent tailgating at entrances. Which measure should you apply?
A) Install turnstiles with access control
B) Add more posters on policies
C) Remove all physical barriers
D) Provide umbrellas for visitors
  • 65. In applying risk management, which step follows risk identification?
A) Risk avoidance
B) Risk assessment and analysis
C) Budget allocation
D) Monitoring guards' attendance
  • 66. Which is an applied method to protect information transmitted through email?
A) Applying encryption and multi-factor authentication
B) Removing passwords
C) Sending drafts to social media inboxes
D) Using unverified public Wi-Fi
  • 67. A security manager must ensure all staff understand emergency roles. Which BCM component should be applied?
A) Salary increase program
B) Flexible work hours
C) Evacuation and response drills
D) General orientation lectures
  • 68. When conducting a security survey of a storage facility, what applied method determines the effectiveness of locks?
A) Listening to employee complaints
B) Performing penetration testing
C) Rearranging inventory
D) Reviewing financial reports
  • 69. Applying personnel security, how should temporary workers be managed
A) Give them master keys
B) Trust referrals without checks
C) Allow them full system access
D) Issue limited access IDs and monitor activities
  • 70. When applying document security for classified materials, which marking system should be used?
A) No markings to avoid suspicion
B) Color-blind friendly icons
C) “Confidential,” “Secret,” and “Restricted” stamps
D) Decorative labels
  • 71. To apply information security during remote work, what should employees use?
A) Open public Wi-Fi
B) Personal email accounts
C) Any software they prefer
D) VPN and secure company devices
  • 72. In risk management, which applied strategy reduces the likelihood of intrusion?
A) Enhancing barriers, lighting, and patrols
B) Eliminating CCTV monitoring
C) Increasing the number of blind spots
D) Reducing guard deployment
  • 73. Which BCM action ensures quick restoration of digital records after system failure?
A) Cmm Giving more breaks
B) Playing music during work
C) Implementing daily data backups
D) Removing antivirus software
  • 74. What is the correct application of a security survey to improve guard performance
A) Reviewing guard logs and observing actual posts
B) Asking only senior guards for input
C) Looking only at CCTV footage
D) Ignoring irregularities found
  • 75. To apply physical security for a VIP event, which measure is MOST appropriate?
A) Remove barriers to ensure smooth flow
B) Allow guests to enter without screening
C) Establish access control points and metal detectors
D) Rely solely on CCTV
  • 76. A company must ensure operations continue during a pandemic. Which BCM strategy should be applied?
A) Create a work-from-home and rotation plan
B) Lay off all employees
C) Lock all offices without notice
D) Cancel all IT support
  • 77. Which principle of Crime Prevention Through Environmental Design (CPTED) is best applied when analyzing how transparent store-front windows reduce concealment zones?
A) Territorial Reinforcement
B) Access Control
C) Maintenance
D) Natural Surveillance
  • 78. When evaluating a building layout, which design feature most effectively integrates architectural security with emergency egress analysis?
A) Multiple concealed corridors
B) Decorative landscaping
C) Clearly marked exit routes
D) High interior walls
  • 79. In analyzing urban planning risks, which pattern indicates ineffective zoning related to crime concentration?
A) Commercial districts with regulated lighting
B) High-crime clusters near abandoned structures
C) Mixed-use areas with pedestrian flow
D) Residential zones with active barangay patrols
  • 80. A facility’s main entrance is exposed to direct vehicle access from a public road. Which security concept should be analyzed to mitigate vehicle-borne threats?
A) Blast stand-off distance
B) Perimeter painting
C) Interior signage
D) Employee comfort spaces
  • 81. Which architectural element provides both deterrence and detection when evaluating layered security?
A) Motion-activated lighting
B) Decorative fences
C) Carpeted hallways
D) Plain glass windows
  • 82. When analyzing pathways in urban design, which condition most increases risk according to CPTED?
A) Open parks with community presence
B) Walkways monitored by CCTV
C) Narrow alleys with poor lighting
D) Pathways near visible public spaces
  • 83. A security planner is assessing how building orientation affects nighttime risks. Which factor is most critical?
A) Rooftop slope
B) Window size
C) Wall color
D) Light distribution and shadow analysis
  • 84. In physical security analysis, what does the presence of multiple unlocked access doors indicate?
A) High community engagement
B) Enhanced visitor experience
C) Strong perimeter control
D) Poor access management
  • 85. Which urban planning factor most affects emergency response time analysis?
A) Public decorations
B) Sidewalk artistry
C) Road network connectivity
D) Billboard placement
  • 86. Analyzing the effectiveness of bollards in a building’s perimeter relates to which security function?
A) Natural surveillance
B) Soft landscaping
C) Access control
D) C Information security
  • 87. When assessing a security zone plan, which area is most vulnerable if mixed with unrestricted public space?
A) Parking façade
B) Reception lobby
C) Core administrative area
D) Outdoor recreation area
  • 88. A facility uses high walls but lacks surveillance. What analysis best explains this weakness?
A) Walls improve natural lighting
B) Walls without monitoring create blind spots
C) High barriers eliminate all threats
D) Walls encourage community bonding
  • 89. In analyzing building materials for security, laminated glass is preferred because it:
A) Fades sunlight exposure
B) Provides resistance to forced entry
C) Reduces electricity consumption
D) Breaks easily for ventilation
  • 90. When analyzing urban crime patterns, which environmental factor often correlates with increased vandalism?
A) Active commercial zones
B) High-visibility parks
C) Areas with poor maintenance ("broken windows")
D) Areas with community events
  • 91. If a facility has excellent CCTV but poor lighting, what can be concluded?
A) CCTV compensates fully for lighting
B) CCTV makes lighting unnecessary
C) CCTV becomes ineffective due to darkness
D) CCTV automatically brightens footage
  • 92. A building entrance facing a blind corner increases risk because it reduces:
A) Interior temperature
B) Structural stability
C) Employee comfort
D) Visibility for approaching threats
  • 93. Analyzing pedestrian traffic flow is essential in security planning because it:
A) Identifies crowding that may mask hostile intent
B) Helps determine paint colors
C) Reduces real estate value
D) Improves interior aesthetics
  • 94. In physical security evaluation, which combination increases intrusion risk?
A) Glass doors + reinforced locks
B) Hidden entrances + poor lighting
C) D CCTVs + guard patrols
D) High walls + intrusion alarms
  • 95. Which urban design flaw most contributes to crime displacement analysis?
A) Well-planned zoning
B) Overly wide roads
C) Pedestrian-friendly walkways
D) Hidden escape routes in informal settlements
  • 96. The absence of a defined perimeter in architectural design makes it most difficult to analyze:
A) Window design
B) Furniture placement
C) Visitor screening points
D) Employee morale
  • 97. When analyzing physical barriers, which factor most determines their effectiveness?
A) Color scheme
B) Ability to blend with landscape
C) Height, strength, and placement
D) Aesthetic quality
  • 98. A poorly lit parking area is high-risk primarily because it reduces:
A) Employee punctuality
B) Natural surveillance opportunities
C) Landscaping efficiency
D) Economic viability
  • 99. What can be inferred when pedestrian walkways intersect with high-speed traffic lanes?
A) High environmental safety
B) Increased social interaction
C) Improved traffic efficiency
D) Elevated hazard and accident risk
  • 100. If a building uses reflective surfaces at entrances, analysis shows it enhances security by improving:
A) Visibility of approaching individuals
B) Noise reduction
C) Decorative appeal
D) Temperature control
Created with That Quiz — the site for test creation and grading in math and other subjects.