A) Trade crafts B) Civil security C) Weather observation D) Counter SIGINT
A) Weather conditions B) Non-military national C) Enemy combatants D) Military personnel only
A) Corollary and subsidiary guides B) Military operations only C) Economic forecasts D) Specialized training programs
A) Enemy strength and disposition B) Weather condition C) Population density D) Educational levels
A) Security B) Objectivity C) Selection D) Communication
A) It limits the scope of intelligence B) It remains the secrecy of files C) It ensure communication D) It allows for prediction of future events
A) Information about weather condition B) Immediate tactical life C) Descriptive information for long-term use D) Enemy communication data
A) Enemy physical capabilities B) Weather conditions C) Communication patterns and Weakness D) Location of allies
A) Planning B) Collecting C) Analysing D) Processing
A) Protecting against espionage subversion and sabotage B) Planning future operations C) Enhancing communication methods D) Destroying enemy infrastructure
A) Diplomatic relations B) Surveillance radar ang pattern analysis C) Communication Intercepts D) Civilian surveys
A) Collating collected information B) Creating new policies C) Destroying evidence D) Setting up defenses
A) Flexibility B) Continuity C) Timeliness D) Interdependence
A) Collection B) Planning C) Deduction D) Interpretation
A) Security B) Objectivity C) Usefulness D) Interdependence
A) Recording B) Planning C) Collection D) Analysis
A) Analyzing local community issues B) Investigating small-scale crimes C) Coordinating Intelligence for National Security D) Training foreign diplomats
A) Maritime and aerial reconnaissance B) Local crime Scene Investigation C) Economic analysis D) Educational outreach programs
A) Recording B) Deduction C) Collecting D) Processing
A) Collecting field data B) Tactical Operations C) Policy making and decisions D) Training exercises
A) Organizing training exercise B) Understanding the mission requirements C) Collecting weapons D) Setting up defenses
A) Collection B) Integration C) Analysis D) Recording
A) Geographic location of enemy bases B) Knowledge of weather patterns C) Data on individual personalities in power D) Information on public safety
A) Censorship B) Sabotage C) Convert method D) Overt method
A) Collection B) Planning C) Processing D) Interpretation
A) Sun Tzu B) Karl Schulmeister C) Walsingham D) Hannibal of Rome
A) It must be covert B) It should be told well and be convincing C) It must remain in secret files D) It must focus only on domestic affairs
A) Julius Caesar B) Delilah C) Karl Schulmeister D) Frederick the Great
A) Destroying hostile activities B) Tracking economic data C) Gathering weather reports D) Training new recrut
A) Education and public safety Information B) Information to prevent crimes and arrest offenders C) Military tactical information D) Knowledge about weather changes
A) "Security Above all" B) "Knowledge is power" C) "Safety through Strength" D) "Knowledge is safety"
A) Long-term forecasts and prediction B) Real-time data C) Enemy identification D) Immediate tactical updates
A) Walsingham of England B) Hannibal of Rome C) Major General Donovan D) Sun Tzu
A) Providing direct to officer B) Analyzing weather patterns C) Gathering geographical data D) Disguising to gain confidence of suspects
A) Sociological Intelligence B) Biographical Intelligence C) Geographical Intelligence D) Armed force Intelligence
A) Armed forces movements B) Military manpower recruitment C) Public opinion and demographics D) Economic development
A) Operational B) Contributory C) Estimative D) Collateral
A) Tactical Military Operations B) Diplomatic Negotiations C) Weather Conditions D) Maintaining peace and order
A) It should always be speculative B) It should be communicated on time C) It should never charge D) It is only useful for military purposes
A) Conducting Surveillance of Civilians B) Training personnel for covert operations C) Gathering weather data D) Investigating violations of espionage laws
A) Installations B) Finances C) Diplomatic relations D) Weapons
A) Human Intelligence B) Hazardous Intelligence C) Human Identification Network D) High Utility Military Network
A) Enemy Combatants B) Weather Conditions C) Non-military Nationals D) Military personnel only
A) Finance B) Weather C) Terrain D) People
A) Port Frontier and Travel Security B) Special Operation C) Civil Security D) Military Security
A) Offensive Operations B) Training field agents C) Preventing unauthorized access to sensitive data D) Weather analysis
A) Administrative tasks in government agencies B) End product from collecting, evaluating and analyzing information C) Collection of information on weather patterns D) Enforcement of laws and regulations
A) It is required by law B) Late information is useless C) It enhances training D) It is more profitable
A) Military Security B) Civil Security C) Censorship D) Counter Intelligence
A) Researching economic and military potential B) Analyzing the organizational structure of the armed forces C) Studying the psychological aspects of people D) Gathering information on criminal activities
A) Military recruitment B) Protection of lives and properties C) Preventing Cybercrimes D) Diplomatic Negotiations
A) International diplomacy B) Immediate Operational decision C) Training civilians D) Future policy formulation
A) Overt method B) Trade crafts C) Public surveys D) Open communication |