You are on page 1of 8


Registration of a security agency must be processed at what particular government agency. a. PNP SAGSD c. DND, Civil Defense Office b. NAPOLCOM d. Securities and Exchange Commission 2. Minimum age requirement for S ecurity Manager or Operator of a Security Agency. a. 25 years old c. 35 years ol d b. 30 years old d. 40 years old 3. He exercises the power to revoke, for cause s licenses issued to security guards. a. Chief, PNP c. Chairman, NAPOLCOM b. Und er Secretary, for Peace and Order d. Secretary, DILG 4. Refers to a natural or m an made structure which is capable of delaying illegal access to a facility. a. Wall b. Fence c. Barriers d. Beach front 5. It refers to means and ways that per sonnel and employees making them security conscious. a. Security promotion c. Se curity Investigation b. Security Education d. Security seminar. 6. Industrial es tablishments must establish the first line of physical defense, it refers to: a. Perimeter barriers c. Door, lock s, window barriers b. The building itself d. E ntry points where security guars are located 7. Physical security is a system of barriers placed between the potential intruder and the object matters to be pro tected. As a criminologist, this is simply a denial of________. a. Opportunity t o commit the offense c. Access to the object of protection b. Opportunity to the object of protection d. Criminal instinct to surface in the potential offender 8. Weakest link in the security chain. a. Security guards b. manager c. Barriers d. Personnel 9. Perimeter barriers, protective lighting, and__________ system a re known in industrial security as physical security. a. Guarding b. Reporting c . Relieving d. Accounting 10. This is an additional outward inclined fixed struc ture, usually barbed wires placed above a vertical fences to increase physical p rotection from intruders of a certain area, this is known as_________. a. Cellar guard b. Tower guard c. Top guard d. Top tower 11. The exterior and interior pa rallel area near the perimeter barrier of an industrial compound to afford bette r observation and patrol movement is known as____________. a. Protective zone b. Clear zone c. Twilight zone d. patrol lane zone 12. Protective guarding in a co mpound can be done by the use of electronic hardware, human guards and even anim als. In England, an owner to protect his compound used this and they are not onl y effective but also the cheapest to maintain. This man is using___________. a. Doberman dog b. tamed tigers and lions c. Geese d. Duck 13. The government agenc y that issues licenses for private and government security guards isa. PNP SOSIA b. Municipal \City mayor office c. PNP FEO d. PNP SAGSD 14. If access is limite d only to authorized personnel, this particular place is referred to asa. Compro mise area b. Danger area c. Restricted area d. Exclusive area 15. First measure undertaking before a comprehensive security program for an industrial plan could be developed. a. Security survey b. Security education c. Security check d. Sec urity Inspection 16. A security of a plant or industrial firm is also known by o ther terms except. a. Security audit b. risk assessment c. Vulnerability d. Robb ery evaluation 17. Today there are three categories of security guards belonging to the Blue Army. One of these listed below does not belong to the group. a. Bo dy guard s b. Agency guard s c. Company guards d. Government security guards 18. Whether to put up its own security guards organic to the firm or hire contractual agenc y guards have their individual merits and disadvantages. To determine which type of guarding system an industrial firm will require, management must consult____ _____. a. a security agency owner b. a police officer c. a military intelligence officer d. a security consultant not connected to or owning a security agency, or part thereof

FINAL EXAM 19. As a security officer, you can not prevent nor protect natural ha zards like storm, earthquakes, floods and the like. In order to reduce the disas trous effects of these natural hazards, you will__________. a. Prepare a disaste r or emergency plan for these hazards for the firm b. Not take any concern on su ch hazards c. Alert your guards when hazards occur d. Call PAGASA and inquire wh en the next storm is coming 20. Practical exercise or test of a plan or activity to determine its effectiveness is called. a. Evac. Plan b. Dry-run c. Fire dril l d. Sham drill 21. The management of keys used in plant, office or business org anization to prevent unauthorized access is referred to asa. Key management b. k ey control c. Lock control d. Security key control 22. There are many types of t ypes of electronic and electric protective devices available for security buildi ngs, storehouses and compounds. One of the following is true. a. Electronic\elec tric devices eliminate human guards b. Each building or compound requires partic ular electronic\electrical protective devices c. Types of alarms needed can best be given by the dealers of said devices d. Electronic\electrical devices provid e total protection for the place to be safeguarded 23. As a security chief of an industrial firm, inventory shows that pilferage is rampant in the warehouses. W hat will be your choice of action? a. Tighten checking at exits of vehicles of t he compound\complex b. Prepare your protective plans and confer with management for their immediate implementation c. Deploy intelligence men in pilferage prone areas to catch the culprits d. To resign as you have failed your job. 24. In an industrial firm, there is a need for document security. As a security officer, you can advice management on this aspect although this is not totally your assig ned work. Document security is not a protection of vital records froma. Unauthor ized access c. Theft or loss b. Compromise or destruction d. Authorized handless 25. The main reason for a personnel security investigation isa. To weed out und esirable employees; b. To check loyalty of employees to the organization c. Prec lude assignment to sensitive positions for those who are security risks; d. To d etermine the character and reputation of certain employees secretly tagged as ri sks. 26. It is defined as system of barriers placed between the matters protecte d and the potentials intruder. a. Physical Security c. Personnel Security b. Doc ument Security d. Computer Security 27. This type of alarm system utilizes a sta tion located outside the compound. a. local alarm system c. Proprietary system b . Central alarm system d. Auxiliary system 28. It is installed as part of the bu ilding which holds up to 10,000 cubic meters of essential items. At least 12 fee t in height, with enough ventilation and fire proof of at least 1 hour. a. safe c. file room b. vault d. protective cabinet 29. it is the susceptibility of a pl ant or establishment to damage, loss or disruption of operations due to various hazards. a. relative criticality c. risk assessment b. relative vulnerability d. risk analysis 30. It refers to the importance of the establishment with referen ce to the national economy and security. a. relative criticality c. risk assessm ent b. relative vulnerability d. risk analysis 31. The association of all licens ed security agencies operators. a. PAOPAD b. PODPAO c. PADPAO d. POAPAD 32. Who among below can own or operate a security agency. a. an alien but living here c. a Filipino citizen b. any one provided he knows the job d. all of them 33. A li cense issued to operate security agency or company forces. a. License to operate c. business license b. license to engage in business d. all of them 34. Republi c Act No. 5487 governs the operation ofa. private security forces\agencies c. pr ivate detective b. company security d. all of them

FINAL EXAM 35. A fact-finding probe to determine a plant adequacy and deficiency all aspects of security, with the corresponding recommendation. a. security ope ration c. security survey b. security inquiry d. security audit 36. Barrier whic h includes but not limited to wall, fences, grill, etc. a. natural barriers c. m an-made barriers b. physical barriers d. structural barriers 37. One who steals due to his inability to resist the unexpected opportunity and has little fear by detection. a. insider c. outsider b. casual d. systematic 38. A barrier which i ncludes but not limited to mountains, cliff, ravines, etc. a. animals c. human b . natural d. energy 40. Issued by the security guard for personnel to be admitte d to the company. a. access list c. pass system b. ID d. duress code 41. A mecha nical device of supplying water which can be manual or motor driven. a. fire pum p c. fire extinguisher b. fire hydrant d. stand pipe 42. Intrusion alarm devices are designed to_______ and not prevent criminals from trespassing and should be used normally as an independent adjunct and not a replacement of the human guar d forces. a. impeded c. deterred b. provide d. detect 43. An authenticated list of personnel given to security allowing entry to compound or installation or par t thereof. a. duress code c. ID b. access list d. pass system 44. The act or con dition affecting the safe operation of the facility caused by human action, acci dental or intentional. It includes sabotage espionage, pilferage and theft, disl oyalty, disaffection and subversive activities. a. human hazard c. natural hazar d b. artificial hazard d. electronic hazard 45. Example of the security communic ation system. a. radio c. telephone b. paging system d. all of them 46. The revi sed rules and regulations governing the organization and operation of private de tective and private security agencies and company security forces throughout the country. a. Security law c. International law b. Private law d. Private securit y law 47. A metallic container used for the safekeeping of documents or small it ems in an office or installation. a. safe c. drawer b. basket d. steel cabinet 4 8. A heavily constructed fire and burglar resistant container usually a part of the building structure used to keep and protect cash, document and negotiable in struments. a. concrete coffin c. vault b. steel cabinet d. basket 49. Steel or p lastic pipes located the building from the lowest to the top floor with water un der pressure for use in case of fire. a. stand pipe c. wet pipe b. top pipe d. l owering pipe 50. Who among below are exempted from pre-licensing training. a. AF P and PNP veterans c. AFP and PNP retirees b. Graduates of ROTC basic or advance d. all of the above 51. Tenure of security personnel is based ona. tenure provi ded by the labor law b. labor only contracting between the agency and the guard c. the service contract between the agency and the client d. can be extended by the client 52. Before private security agencies render security services to its clients, there must be a contract that must bind them calleda. Security service contract c. Contract service b. Security contact d. Contract service

FINAL EXAM 53. Which below is a qualification for the operator or manager of sec urity agency? a. Filipino Citizen b. At least 25 years of age c. Commissioned of ficer, inactive or retired from AFP or PNP or a graduate of Industrial Security Management with adequate training and experience in the security business d. all of them 54. A security force maintained and operated by any private company\cor poration for its own security requirements only. a. Private Security Agency c. C ompany Security Force b. Government Security Unit d. Insular Security force 55. A person who offers or renders personal services to watch or secure a residence or business establishment or both isa. security guard c. a and b b. watchman d. a only 56. Includes all the security measures designed to prevent unsuitable ind ividuals or person of doubtful loyalty to the government, from gaining access to classified matter or to any security facility, and to prevent appointment, or r etention as employees of such individuals. a. Personnel security c. Security per sonnel b. Employee security d. both a and c 57. It is an inquiry into the charac ter, reputation, discretion and loyalty of individual in order to determine a pe rson s suitability to be given security clearance. a. PSI b. NAC c. LAC d. BI 58. Co nsist of the investigation of the background of an individual but limited only t o some of the circumstances of his personal life which are deemed pertinent to t he investigation. a. BI b. CBI c. PBI d. PSI 60. A through and complete investig ation of all or some of the circumstances or aspects of a person s life is conducted . a. BI b. CBI c. PBI d. PSI 61. Factors considered in background investigation, excepta. loyalty c. character b. Personal Prestige d. Integrity 62. Motives tha t cause people to be disloyal. a. reputation c. revenge b. Moral d. character 63 . Weaknesses that makes people susceptible to pressure. a. Close relative in for eign lands c. Jealousy b. Weakness of character d. all of them 64. A security un it maintained and operated by any government entity. a. Private Security Agency c. Company Security Force b. Government Security Unit d. Insular Security force 65. Consist of the investigation of the background of a person, particularly all the circumstances of hi9s personal life. a. BI b. CBI c. PBI d. PSI 66. Any per son, association, partnership, firm or private corporation, who contracts, recru its, trains, furnishes or post any security guard, to do its functions. a. Priva te Security Agency c. Company Security Force b. Government Security Unit d. Insu lar Security force 67. Shall be responsible to the Detachment Commander as far a s his shift is concerned. a. Assistant Detachment Commander c. Shift-in-charge b . Security Guard on Duty d. Officer-in-charge 68. Before a security guard can pr actice his profession; he shall possess valid security license. a. Security guar d license c. License to operate b. Drivers license d. Firearms license 69. How m any firearms issued for every two guards employed to the security agency as auth orized by law. a. one b. two c. three d. four 70. Firearms of security agency sh ould be covered with firearms license issued by the PNP through its Firearms Exp losive Division under the Civil Security Group, renewable everya. One year b. Tw o years c. Three years d. Four years

FINAL EXAM 71. That aspect of security which involves the application of securit y measures for the protection and safeguarding of classified information. a. doc ument security c. information security b. personnel security d. Top Secret 72. R efers to assign information by one of the four classification categories. a. Sec urity clearance c. Classified b. Declassify d. Reclassify 73. Refers to the admi nistrative determination that an individual is eligible for access to classified matter. a. Security clearance c. Classified b. Declassify d. Reclassify 74. Mea ns lose of security, which results from an authorized persons obtaining knowledg e of classified matter. a. Compromise c. Criticality b. Probability d. Vulnerabi lity 75. These are information and material, the unauthorized disclosure of whic h would cause exceptional grave damage to the nation, politically, economically or from a security aspect. This category is reserve for the nation s closet secret a nd is to be used with great reserve. a. Top Secret matters c. Secret matters b. Confidential matters d. Restricted matters 76. These information and material, t he authorized disclosure of which would endanger national security, cause seriou s injury to the interest or prestige of the nation or of any governmental activi ty or would be of great advantage to a foreign nation. a. Top Secret matters c. Secret matters b. Confidential matters d. Restricted matters 77. These informati on and material, the authorized disclosure of which, while not endangering the n ational security, would be prejudicial to the interest or prestige of the nation or any government activity, or would cause administrative embarrassment or unwa rranted injury to an individual or would be of the advantage to a foreign nation . a. Top Secret matters c. Secret matters b. Confidential matters d. Restricted matters 78. It is information that in some special way relates to the status or activities of the possessor and over which the possessor asserts ownership. a. P roprietary information c. Trade Secret b. Patents d. Transmission security 79. I t maybe a formula for a chemical compounds a process of manufacturing, treating or preserving materials, a pattern for machine or device, or a list of customers . a. Proprietary information c. Trade Secret b. Patents d. Transmission security 80. It is the protection resulting from the application of various measures whi ch prevent or delay the enemy or unauthorized persons in gaining information thr ough our communications. a. Communication Security c. Transmission Security b. C ryptographic Security d. all of the above 81. Is that component of communication security which results from the provisions of technically sound crypto-system a nd their proper use. a. Communication Security c. Transmission Security b. Crypt ographic Security d. all of the above 82. A system which uses words as the small est element. a. Cipher c. Code b. Concealment d. Transposition System 83. A syst em that manipulate one, two or three characters at a time. a. Cipher c. Code b. Concealment d. Transposition System 84. It is the potential damage or loss of an asset. a. Criticality c. Risk b. Security hazard d. Adversary 85. It is the imp act of a loss as measured in financial terms. a. Criticality c. Risk b. Security hazard d. Adversary 86. Eliminating or removing the risk totally from the busin ess, government, or industrial environment for which the risk manager has respon sibility. a. Risk Reduction c. Risk Spreading b. Risk Avoidance d. Risk Self-ass umption

FINAL EXAM 87. It is an act of spying. a. Sabotage c. Espionage b. Pilferer d. S aboteur 88. It is one of the most annoying and common human hazards which securi ty has to deal with. a. Pilferage c. Casual Pilferage b. Systematic Pilferage d. none of the above 89. One who steals with preconceived plans and takes always a ny or all types of items or supplies for economic gain. a. Pilferage c. Casual P ilferage b. Systematic Pilferage d. none of the above 90. What date that Republi c Act 5487 or the private Security Agency Law was passed a. June 31, 1969 c. Jun e 13, 1969 b. June 7, 2009 d. June 13. 1999 91. A natural hazards or act of God. a. Force majeure c. Phenomenon b. Disaster d. Calamity 92. A restricted area wh ere visitors are limited in movement and are usually escorted. a. Protected Area c. Limited area b. Restricted area d. Exclusive area 93. A structure placed abo ve a vertical fence to increase protection from intruder. a. Top guard c. Clear zone b. Tower guard d. Guard house 94. A conference similar to entrance conferen ce, this is only done after the completion of security survey. a. Exit conferenc e c. Briefing b. Debriefing d. Entrance conference 95. It is the lost that would be sustained if a given target or combination of target where totally removed, destroyed or both. a. Possible Maximum Loss c. Probable Maximum loss b. Risk Tra nsfer d. Risk Reduction 96. Refers to the amount of loss a target would be likel y to sustain through, e.g. robbery, theft and so on. a. Possible Maximum Loss c. Probable Maximum loss b. Risk Transfer d. Risk Reduction 97. A term used in Eng land for lock pickers, safe crackers and penetrators of restricted rooms or area . a. Peterman c. Peter pan b. Batman d. Superman 98. The badge or pass coded for authorization to enter specific areas is issued to an employee who keeps it in his possession until his authorization is terminates. a. Multiple pass system c. Pass exchange system b. single pass system d. Pass system 99. Company owned ala rm systems with a unit in the nearest police station so that in case of need, di rect call is possible. a. Central Station System c. Proprietary System b. Local alarm system d. Auxiliary alarm 100. This system consists of ringing up a visual or audible alarm system near the subject to be protected. a. Central Station Sy stem c. Proprietary System b. Local alarm system d. Auxiliary alarm