You are on page 1of 44

INTELLIGENCE AND SECRET SERVICE BOARD EXAMINATION SAMPLE QUESTIONNAIRE

1. It is usually descriptive in nature, accumulation of physical description of personalities, modus


operandi. It does not have immediate operational value but rather long range that may become relevant
to future police operations.

a.Line Intelligence

b. Intelligence

c. Strategic Intelligence

d. Tactical Intelligence

2. A kind of intelligence required by the commander to provide for planning and conduct tactical and
administrative operation in counter insurgency. This pertains to knowledge of People, weather, enemy
and Terrain (PWET) used in planning and conducting tactical and administrative operation in a counter
insurgency.

a. Line Intelligence

b. Intelligence

c. Strategic Intelligence

d. Tactical Intelligence

3. The shifting and evaluation of sorted information to isolate insignificant elements with respect to the
mission and operation of the police organization.

a.Casing

b. Assessment

c. Integration

d. Deduction

4. The breakdown of assessed intelligence and information and integrating these into its corresponding
groups.

a.Casing

b. Assessment
c. Integration

d. Deduction

5.To deduce conclusions from integrated intelligence and information.

a.Casing

b. Assessment

c. Integration

d. Deduction

6.The gathering of information or documents procured explicitly without regard as to whether the
subject or target become knowledgeable of the purpose

a.Covert Intelligence

b. Overt Intelligence

c. Counter Intelligence

d. Police Intelligence

7.The clandestine procurement of information, which is obtained without the knowledge of the persons
safeguarding vital intelligence interest.

a.Covert Intelligence

b. Overt Intelligence

c. Counter Intelligence

d. Police Intelligence

8.An agent who has been recruited by an intelligence service within a highly sensitive target, who is just
beginning a career or have been long insider.

a.Agent in Place

b. Double Agent

c. Expandable Agent

d. Agent 007
9.An enemy agent, who has been captured, turned around and sent back where he came from as an
agent of his captors.

a.Expandable Agent

b. Double Agent

c. Agent in Place

d. Provocation Agent

10.An agent whom false information is leaked to the enemy.

a.Expandable Agent

b. Double Agent

c. Agent in Place

d. Provocation Agent

11. An agent who has such reached the enemy gets information and would manage to get back alive.

a.Penetration Agent

b. Agent of Provocation

c. Double Agent

d. Expandable Agent

12. Is a form of clandestine investigation which consists of keeping persons, place or other targets under
physical observation in order to obtain evidence or information pertinent to an investigation.

a. Surveillant

b. Surveillance

c. Intelligence

d. Line Intelligence

13. Surveillance of person whether on discreet or openly manner is called ____________.

a. Tailing

b. Shadowing
c. Casing

d. Both a and b

14. Surveillance of place is called ____________.

a.Casing

b. Roping

c. Reconnaissance

d. Both a and b

e. Both a and c

15. Surveillance of other things, events, and activities is called ____.

a. Casing

b. Roping

c. Reconnaissance

d. Both a and b.

16. An agent who uses power to gain information.

a.Agent of Influence

b. Agent of Provocation

c. Double Agent

d. Agent in Place

17. One who goad the enemy to give information.

a.Agent in Place

b. Agent of Provocation

c. Double Agent

d. Expandable Agent

18. He wrote the book entitled “The Art of War” which is the favorite readings of Mao Tse Tung.
a. Alexander the Great

b. Akbar

c. Frederick the Great

d. Sun-Tzu

19. Father of organized Military Espionage who divided his agents into four classes.

a. Alexander the Great

b. Napoleon Bonaparte

c. Sun-Tzu

d. Frederick the Great

20. Classification of an agents who were recruited among poor folk, glad to earn a small sum or to
accommodate as military officer.

a.Double spies

b. Common Spies

c. Spies of Consequences

d. None of these

21. Composed of unreliable renegades, chiefly involved in spreading false information to the enemy.

a.Double Spies

b. Common spies

c. Spies of Consequence

d. Spies Lab

22. Composed of couriers and noblemen, staff officers, and kindred conspirators, requiring a substantial
bribe or bait.

a.Double Spies

b. Common spies

c. Spies of Consequence
d. Spies Lab

23. This kind of intelligence covers the activity devoted in destroying the effectiveness of hostile foreign
activities and to the protection of info against espionage, subversion and sabotage.

a.Intelligence

b. Military Intelligence

c. Police Intelligence

d. Counter Intelligence

24. Which of the following is not synonymous with the other?

a.Tailing

b. Shadowing

c. Stalking

d. Surveillant

25. Intelligence can be defined as the following, EXCEPT:

a.An organization

b. An Activity

c. A Process

d. None of these

26. Who sent 12 leaders of Israel to spy out the land of Canaan?

a.Akbar

b. Rehab

c. Delilah

d. Moses

27. Responsible for protected and hide the agents of Israel, she made a covenant with the agents and
duped their pursuers.
a.Akbar

b. Rehab

c. Delilah

d. Moses

28. Who sheltered and concealed the agents of Israel, she made a covenant with the agents and duped
their pursuers.

a.Alexander the Great

b. Harlot of Jericho

c. Sentorius, quintos

d. Moses

29. Sheltered and concealed the agents of Israel, she made a covenant with the agents and duped their
pursuers.

a.Alexander the Great

b. Rehab

c. Harlot of Jericho

d. Both b and c

30. Delilah she allowed “sex” to gain information from powerful enemy who seduced Samson to know
the latter’s secret.

a.Akbar

b. Rehab

c. Delilah

d. Moses

31. The Roman general in Spain and possessor of the white fawn. His intelligence agents credited their
information to the supernatural power of animals.
a.Sertorius, Quintos

b. Alexander the Great

c. Crassus, Marcus Licinius

d. Akbar

32. He employed both slave and freeman (fire brigade) who when not objectively looking for fires
devoted time in gathering of evidence to be used in the Law Courts.

a.Sertorius, Quintos

b. Alexander the Great

c. Crassus, Marcus Licinius

d. Akbar

33. The “Great Mogul” and sagacious master of Hindustan who employed more than four thousand
agents to bring him the truth that his throne might rest upon him.

a. Sertorius, Quintos

b. Alexander the Great

c. Crassus, Marcus Licinius

d. Akbar

34. He used intelligence to conquer China and invade Cathay and send spies and used prisoners as
sources of information

a. Sertorius, Quintos

b. Alexander the Great

c. Crassus, Marcus Licinius

d. Genghis Khan
35. Napoleon’s military secret service and Napoleon’s eyes. He began his career in offensive
espionageunder a cover role and infiltrated the Austrian General Staff and studied the characters of the
Generals.

a.Sertorius, Quintos

b. Karl Schulmeister

c. Crassus, Marcus Licinius

d. Akbar

36. The father of organized military espionage who established rules for obtaining and using every grade
of spy that divided his agents into four classes.

a. Sertorius, Quintos

b. Frederick the Great

c. Crassus, Marcus Licinius

d. Akbar

37. Developed an effective intelligence system for 15 years in Rome He often disguised as beggar to
gather first hand information.

a. Sertorius, Quintos

b. Hannibal

c. Crassus, Marcus Licinius

d. Julius Ceasar

38. He includes ten “speculators” in each legion that served as information-collecting agency. His
“speculators” were the first intelligence personnel to appear definitely in a military organization.

a.Sertorius, Quintos

b. Crassus, Marcus Licinius


c. Julius Ceasar

d. Hannibal

39. As a process is an activity which treats information as basis for departmental policy and decision-
making.

a. Intelligence defined as an activity.

b. Intelligence defined as n organization.

c. Intelligence defined as a process

d. All of the Above

40. An institution composed of persons who pursue a special kind of knowledge for the purpose of
planning the collection of information, processing and dissemination of intelligence relating to police
operations.

a. Intelligence defined as an activity.

b. Intelligence defined as n organization

c. Intelligence defined as a process

d. All of the Above

41. The following are the Intelligence units of the Philippine National Police, Except:

a.D2

b. R2

c. S2

d. U2

42. Intelligence Units for AFP General Headquarters:

a. J2

b. MIG

c. ISAFP

d. N2
43. Intelligence branch of the Armed Forces Operations Arm,

a. ISAFP

b. J2

c. MIG

d. G2

44. Regional Operatives per Region of the Armed Forces of the Philippines.

a.MIG

b. J2

c. G2

d. N2

45. An intelligence branch of the Philippine Army in the General Headquarters.

a. G2

b. MICOs

c. N2

d. S2

46. GHQ Naval Intelligence.

a. N2

b. G2

c. S2

d. MIG

47. Intelligence units of the Philippines Marines Intel;

a.S2

b. G2

c. S2

d. MIG
48. CG2- Philippine Coast Guard;

a.N2

b. CG2

c. S2

d. MIG

49. F2- Intelligence unit of the Philippine Fleet

a.F2

b. G2

c. S2

d. MIG

50. General Head quarter Intelligence of the Philippine Air force.

a.F2

b. G2

c. S2

d. A2

51. Principal for intelligence activities and covert operations in United States of America that was
created under the US National Security Act of 1947 under the National Security Council.

a.CIA

b. NBI

c.KGB

d. NSA

52. Made responsible for collecting signals intelligence from all over the world and for overseeing the
integrity of American secret communication.

a. Central Intelligence Agency


b. National Bureau of Investigation

c. National Security Agency

d. All of the above

53. Provides military intelligence to the Department of Defense.

a. Defense Intelligence Agency

b. Federal Bureau of Investigation

c. Central Intelligence Agency

d. National Security Agency

54. Performs counterintelligence activities within the United States that was established in 1908 as an
investigative arm of the US Department of Justice.

a. Defense Intelligence Agency

b. Federal Bureau of Investigation

c. Central Intelligence Agency

d. National Security Agency

55. First director of the Federal Bureau of Investigation who was installed in 1924.

a. Edgar John Hoover

b. John Edgar Hoover

c. John Edgar Hover

d. Edgar John Hoover

56. Great Britain’s intelligence tradition dating from Queen Elizabeth I which is equivalent to United
States Federal Bureau of Investigation made responsible for counterintelligence activities.

a.MI-5

b. CIA

c. NSA

d. KGB
57. Also known as the Secret Intelligence Service (SIS) which is analogous to CIA that ran the famous
“Ultra” program during World War II in which coded German Messages, encrypted by the Germans’
enigma machine, that were intercepted, broken and translated, thereby aiding the Allies on their
battlefield.

a.MI-5

b. CIA

c. NSA

d. MI-6

58. Central Institute for Intelligence and Security of Israel that conducts external espionage and also
performs covert operations abroad.

a.MOSSAD

b. SHINBET

c. MAN

d. OMAN

59. General Security Services in Israel responsible for counterintelligence and internal security.

a.MOSSAD

b. SHINBET

c. MAN

d. OMAN

60. Intelligence Corps of the Defense forces of Israel considered as the largest, which focuses on military
intelligence.

a.MOSSAD

b. SHINBET

c. MAN

d. OMAN
61. Former Soviet Union (USSR) Committee for State Security doubled as secret police force controlling
the populace within the country and, outside the USSR, conducting espionage, spreading
“disinformation,” and attempting to destabilize foreign governments.

a.MI-5

b. CIA

c. NSA

d. KGB

62. Komitet Gosudarstvennoy Bezopasnosti of the Soviet Union.

a.KGB

b. CIA

c. NSA

d. MI-5

63. Generally the functions of intelligence are the following, Except:

a. The collection or procurement of information.

b. The evaluation of the information which then become intelligence.

c. The dissemination of intelligence to those who need it.

d. Arrest and apprehension of Criminal offenders.

64. Data that are not of an immediate value that are descriptive in nature, accumulation of physical
description of personalities, modus operandi, etc. which do not have immediate operational value but
rather long range that may become relevant to future police/military operations.

a.Line Intelligence

b. Tactical Intelligence

c. Strategic Intelligence

d. Military Intelligence

65. Which of the following is not a component of Strategic Intelligence?

a. Political Intelligence
b. Economic Intelligence

c. Transportation and Communication Intelligence

d. None of the above

66. Deals with the demographic and psychological aspects of groups of people such as population &
manpower, Characteristics of the people and Education.

a. Biographical Intelligence

b. Sociological Intelligence

c. Analytical Intelligence

d. Geographical Intelligence

67. Deals with the individual personalities having actual possession of power.

a. Biographical Intelligence

b. Sociological Intelligence

c. Analytical Intelligence

d. Geographical Intelligence

68. Type of intelligence required by the commander to provide for planning and conduct of tactical
operation such as people’s living condition; sources of income; education of the people; government
livelihood project; extent of enemy influence to the people, weather condition , enemy location; their
strength; disposition tactical capability; enemy vulnerability, and terrain.

a. Line Intelligence

b. Tactical Intelligence

c. Combat Intelligence

d. All of the above

69. It covers the activity devoted in destroying the effectiveness of hostile foreign activities and the
protection of information against espionage, and sabotage.

a.Line Intelligence

b. Military Intelligence
c. Counter Intelligence

d. Police Intelligence

70. Also known as negative intelligence because it is an activity dedicated to the concealment and
protection of one’s own information from the adversaries’ intelligence operation. It is a defensive
function of intelligence.

a.Line Intelligence

b. Military Intelligence

c. Counter Intelligence

d. Police Intelligence

71. The following are some of the objectives of Counter Intelligence, which of them is not?

a. Prevent enemy sabotage, espionage and subversion

b. Security of the command

c. Denies knowledge to the enemy.

d. Aids the activities in achieving surprises.

e. None of the above

72. Type of Counter Intelligence which seek to conceal information from the enemy as its measures.

a. Passive Measures

b. Active Measures

c. Deception Measures

d. Inactive Measures

73. Counter Intelligence measure which seeks active block to the enemies’ effort to gain information or
engage in espionage, subversion, espionage or sabotage.

a.Passive Measures

b. Inactive Measures

c. Deception Measures

d. Active Measures
74. Type of Counter Intelligence that deceives the enemy.

a.Passive Measures

b. Active Measures

c. Deception Measures

d. Inactive Measures

75. it seeks to overcome enemy attempts to use human sources to collect information or to conduct
sabotage and subversion such as: CI Special Operations; Liaison; Counter Security; and CI Screening.

a. Counter Human Intelligence (HUMINT)

b. Counter-Imagery Intelligence (IMINT)

c. Counter-Signal Intelligence (SIGINT)

d. Counter Active Natural Intelligence (CANDYMINT)

76. It includes actions taken to determine enemy IMINT and related enemy war capabilities and
activities. These actions include: Surveillance radar; Photo thermal and infrared systems. Successful
counter-IMINT operations rely heavily on pattern and movements’ analysis and evaluation.

a. Counter Human Intelligence (HUMINT)

b. Counter-Imagery Intelligence (IMINT)

c. Counter-Signal Intelligence (SIGINT)

d. Counter Active Natural Intelligence (CANDYMINT)

77. It determines enemy SIGINT and related enemy war capabilities and activities; assess friendly
operations to identify patterns, profiles and developments; and recommend and analyze counter
measures.

a. Counter Human Intelligence (HUMINT)

b. Counter-Imagery Intelligence (IMINT)

c. Counter-Signal Intelligence (SIGINT)

d. Counter Active Natural Intelligence (CANDYMINT)


78. The end product resulting from the collection, evaluation and interpretation of all available
information which concerns one or more aspects of police operations and which is immediately or
potentially significant to police planning.

a.Police Intelligence

b. Military intelligence

c. Intelligence

d. Counter Intelligence

79. The following are the major categories of intelligence, which from among them is not?

a.Strategic Intelligence

b.Line Intelligence

c. Counter-Intelligence

d. Intelligence

80. A complete and accurate scrutiny by an individual of his surroundings and encompasses the use of
all the major senses to register and recognize its operational or intelligence significance.

a.Observation

b. Interpretation

c. Description

d. Speculation

81. The actual and factual reporting of one’s observation of the reported sensory experience recounted
by another.

a.Observation

b. Interpretation

c. Description

d. Speculation

82. Refers to the Psychological Process for accurate observation of becoming aware of an existence of
fact.
a.Perception

b. Observation

c. Attention

d. Recording

83. Refers to the Psychological Process for accurate observation of understanding the fact of awareness.

a.Perception

b. Observation

c. Attention

d. Recording

84. Refers to the Psychological Process for accurate observation of identifying the name in own mind
and some fact which have been perceived.

a.Perception

b. Observation

c. Attention

d. Recording

85. A system or plan whereby information of intelligence value is obtained through the process of direct
intercommunication in which one or more parties is/are unaware of the specific purpose of the
conversation.

a.Agitation

b. Casing

c. Roping

d. Elicitation

86. The following are the phases of elicitation, except:

a. Determination of the mission

b. Selection of the subject

c. Accomplishment of the mission


d. Apprehension of the subject under mission

87. The following are the Purpose of Elicitation, except.

a. To acquire info unavailable thru other channel

b. To obtain information which although unclassified is not publicly known

c. To provide sources of information

d. No exception

88. There are two Devices used in Elicitation, what are they?

a.Approach

b. Study

c. Probe

d. Both a and c

89. A devise used in elicitation which relate to the process of setting people to start talking

a.Approach

b. Study

c. Probe

d. Both a and b

90. This devised used in elicitation is for the purpose of keeping people to talk incessantly.

a.Approach

b. Study

c. Probe

d. Both a and b

91. A variant of a Flattery type of approach whereby the subject is treated as an authority.

a. Teacher-pupil

b. Kindred-soul
c. Good-Samaritan

d. Partial-disagreement

92. A variant of a Flattery type of approach whereby the prober shows enough concern to the subject.

a.Teacher-pupil

b. Kindred-soul

c. Good-Samaritan

d. Partial-disagreement

93. A variant of a Flattery type of approach whereby the prober offers help and assistance to the
subject.

a.Teacher-pupil

b. Kindred-soul

c. Good-Samaritan

d. Partial-disagreement

94. A type of an elicitation approach applied by an elicitor for people who are susceptible to praise.

a.Provocative approach

b.Mixed Approach

c. Flattery Approach

d. None of these

95. A type of an elicitation approach applied by an elicitor that uses conventional gambits.

a.Provocative approach

b. Flattery Approach

c. Mixed Approach

d. None of these
96. A variant of a provocative approach where the elicitor accumulates knowledge of the subject.

a.Manhattan-Missouri

b. Teaser-Bait

c. Joe-Blow

d. National Pride

97. A variant of a provocative approach where the elicitor adopts unbelievable attitude above anything.

a.Manhattan-Missour

b. Teaser-Bait

c. Joe-Blow

d. National Pride

98. A variant of a provocative approach where the elicitor uses to approachable to any field.

a.Manhattan-Missouri

b. Teaser-Bait

c. Joe-Blow

d. National Pride

99. A variant of a provocative approach where the prober used natural propensity to defend country.

a.Manhattan-Missouri

b. Teaser-Bait

c. Joe-Blow

d. National Pride

100. The following are Psychological Process for accurate observation, except:

a.Attention

b. Perception

c. Recording

d. Investigating
101. Means by which an individual, group or organization conceals the true nature of its activities and
existence from the observer.

a. Cover

b. Uncover

c. Cover Story

d. Cover Support

102. A biographical account, true or fictitious, which portray the personality which an agent assumed.

a. Cover

b. Uncover

c. Cover Story

d. Cover Support

103. An agent assigned in target areas with the primary mission of supporting the cover story.

a. Cover

b. Uncover

c. Cover Story

d. Cover Support

104. A type of cover using true or actual personal background to fit the purpose.

a. Artificial cover

b. Cover within cover

c. Natural cover

d. Multiple cover

105. Type of cover using biographical data adopted for a fictitious purpose.

a. Artificial cover

b. Cover within cover


c. Natural cover

d. Multiple cover

106. A type of cover that requires the use of secondary to justify existence

a. Artificial cover

b. Cover within a cover

c. Natural cover

d. Multiple cover

107. Multiple cover – A type of cover which focuses on any cover identity wished.

a. Artificial cover

b. Cover within a cover

c. Natural cover

d. Multiple cover

108. Which from among the following are the Guidelines when cover is compromised?

a. Move out immediately and relocate.

b. Start new facility for operations and develop it.

c. Use new personnel.

d. Let old personnel remain in place.

e. All of the above

109. Is an investigative technique in which an agent conceals his official identity in order to obtain
information from the target organization.

a. Surveillance assignment

b. Cover assignment

c. Undercover assignment

d. All of these
110. Which from among the following are considered Types of Undercover Assignment?

a. Dwelling that establish residence in or near the target area.

b. Work assignment that includes observation at the place of work.

c. Social relative to places of entertainment and amusement frequented by targets.

d. Rope Job that strike friendship with the subject.

e. All of the above

111. The vigorous and confrontational questioning of a suspect about his participation in a crime.

a. Interrogation

b. Interview

c. Investigation

d. Detection

112. An Interrogation Technique that addresses a suspect with an emotional appeal to confess.

a. Emotional appeal

b. Physical appeal

c. Sympathetic Approach

d. Friendliness

113. An interrogation techniques that dig deep into past troubles, plight and unfortunate events in the
life of the Suspect.

a. Emotional appeal

b. Physical appeal

c. Sympathetic Approach

d. Tricks and Bluffs

114. The pretense of solid evidence against the accused as a technique of interrogation.

a. Emotional appeal

b. Physical appeal
c. Sympathetic Approach

d. Tricks and Bluffs

115. The systematic detailed presentation of all information, equipment and materials to the agent that
are necessary for him to understand

a. Briefing

b. Operational testing

c. Dispatch and Reception

d. Dissemination

116. Agent is tested for the purpose of determining his ability, suitability and loyalty.

a. Briefing

b. Operational testing

c. Dispatch and Reception

d. Dissemination

117. The launching of an agent on a mission

a. Briefing

b. Operational testing

c. Dispatch and Reception

d. Dissemination

118. A procedure of terminating the services of an agent on any of the following reasons:
accomplishment of the mission, exhaustion of funds, compromise, lack of access, disloyalty.

a. Deposition

b. disposition

c. Disconnection

d. None of these
119. Literally means putting a thing, or place in a case as used in intelligence operation for the
continuous monitoring of a place or area at a given period of time.

a.Casing

b. Roping

c. Intelligence

d. None of these

120. The following terms as used in intelligence operations are analogous, except:

a. Casing

b. Reconnaissance

c. surveillance

d. Roping

122. It is the observation of the whole area, building or installation, possible exits and approaches, types
of vicinity that may be possibly of help to any intelligence or counter-intelligence operation

a.Interior casing

b. Exterior casing

c. Anterior casing

d. All of these

123. Refers to the close observation of the layout of the building. Included are items which are of
intelligence and Counter-intelligence value.

a.Interior casing

b. Exterior casing

c. Anterior casing

d. All of these

124. A conference held among the team members, police intelligence unit before a surveillance in
conducted.

a. Pre-Surveillance Conference
b. Stake out

c. Tailing or shadowing

d. Undercover Man

125. The observation of places or areas from a fixed point.

a. Pre-Surveillance Conference

b. Stake out

c. Tailing or shadowing

d. Undercover Man

126. Refers to the observation of a person’s movement.

a. Pre-Surveillance Conference

b. Stake out

c. Tailing or shadowing

d. Undercover Man

127. A person trained to observed and penetrate certain organization suspected of illegal activities and
the later reports the observation and information so that proper operational action can be made.

a. Pre-Surveillance Conference

b. Stake out

c. Tailing or shadowing

d. Undercover Man

128. This is the assignment of trained intelligence personnel to other agencies in order to obtain
information of police intelligence value. (Agencies like the press, credit agencies, labor unions,
telephone companies.

a. Liaison Program

b. Safe House

c. Safe House

d. Drop
129. It is a place, building, enclosed mobile, or an apartment, where police undercover men meet his
action agent for debriefing or reporting purposes.

a. Liaison Program

b. Safe House

c. Safe House

d. Drop

130. It is a convenient, secure, and unsuspecting place where a police, undercover man, informer, or
informant by a pre-arrangement leaves a note, a small package, an envelope to item for the action
agent, supervisor or another agent.

a. Liaison Program

b. Safe House

c. Safe House

d. Drop

131. An accomplice or associate of the subject.

a. Convoy

b. Decoy

c. Contact

d. Made or Burnout

132. Any person almost similar to the subject used to avoid or elude surveillance.

a. Convoy

b. Decoy

c. Contact

d. Made or Burnout

133. Any person or subject picks or deals with while he is under surveillance.

a. Convoy
b. Decoy

c. Contact

d. Made or Burnout

134. When subject under surveillance becomes aware that he is under observation and identifies the
observer.

a. Convoy

b. Decoy

c. Contact

d. Made or Burnout

135. When the surveillant do not know the whereabouts of their subject or the subject had eluded the
surveillant.

a. Lost

b. Rabbit or Hare

c. Test for tailing

d. None of these

136. The term referring to the subject of shadowing and tailing.

a. Lost

b. Rabbit or Hare

c. Test for tailing

d. None of these

137. The common trick of the subject (rabbit) when he becomes conscious that he is being tailed. The
rabbit usually boards a public conveyance then jumping off the vehicle then he looks about quickly to
determine if any another person jumps off also.

a. Lost

b. Rabbit or Hare

c. Test for tailing


d. None of these

138. The subject is unaware that he/she is under observation

a. Discreet

b. Close

c. Loose

d. None of these

139. When the subject is aware that he/she is under observation varied on each occasion.

a. Discreet

b. Close

c. Loose

d. None of these

140. Applied frequently or infrequently, and period of observation varied on each occasion

a. Discreet

b. Close

c. Loose

d. None of these

141. Observation of place usually a bookie stall, gambling joint, or a residence where illegal activities are
committed (fixed point position).

a. Technical

b. Moving

c. Tailing

d. Stationary

142. Surveillant follow the subject from place to place to maintain continuous watch/observation of
his/her activities.
a. Technical

b. Moving

c. Tailing

d. Stationary

143. Uses communication and electronic hardware, gadgets, systems and equipment.

a. Technical

b. Moving

c. Tailing

d. Stationary

144. Commonly used because of the least number of men involved.

a. One man shadow

b. Two man shadow

c. Three man shadow

d. None of these

145. This is more advantageous because it permits immediate change and are less likely to be
recognized. One officer will follow the subject and the other will keep abreast or on the opposite side of
the street.

a. One man shadow

b. Two man shadow

c. Three man shadow

d. None of these

146. An ABC Method where A is closest to subject S. He follows S at a distance depending on the
pedestrian traffic. B follows A about the same distance between A and S. B and C take turns in occupying
the A position and Pre-arranged signals should be employed.

a. One man shadow

b. Two man shadow


c. Three man shadow

d. None of these

147. A person who gives information to the police voluntary or involuntary, without any condensation.

a. Informer

b. Informant Net

c. Informant

d. Information

148. An individual who gives information for a price or reward. (He may be in the payroll of the law
enforcement agency.)

a. Informer

b. Informant Net

c. Informant

d. Information

149. A controlled group of person who worked through the direction of the agent handler. The
informants principal or cut-outs supply the agent handler directly or indirectly of intelligence
information

a. Informer

b. Informant Net

c. Informant

d. Information

150. One who give information to the police pertaining to the underworld about organized criminals
with the understanding that his identity will be protected.

a. Confidential Informant

b. Criminal Informant

c. Voluntary Informant

d. Special informant
151. Similar to criminal informants however this informant gives information about law violation which
includes crimes and criminals.

a. Confidential Informant

b. Criminal Informant

c. Voluntary Informant

d. Special informant

152. One who give information freely and willfully as a witness to a certain act.

a. Confidential Informant

b. Criminal Informant

c. Voluntary Informant

d. Special informant

153. One who gives information concerning specialized cases only and he/she is regarded special
treatment by the operatives i.e., teachers, businessmen, etc.

a. Confidential Informant

b. Criminal Informant

c. Voluntary Informant

d. Special informant

154. One who gives information through telephone or other means of communication with the hope
that he/she should not be identified.

a. Confidential Informant

b. Criminal Informant

c. Anonymous Informant

d. Special informant

155. Category of informant that furnish information without intention of repeating such as interviewees,
walk-ins or volunteers or unwitting informants
a.Recruited

b. Automatic

c. Casual

d. Incidental

156. Category of informant from group of professionals who possess or have access to information.

a.Recruited

b. Automatic

c. Casual

d. Incidental

157. Category of informant who furnished information by virtue of their official positions.

a.Recruited

b. Automatic

c. Casual

d. Incidental

158. Categories of informants specially selected, trained and utilized as continuous source

a.Recruited

b. Automatic

c. Casual

d. Incidental

159. Types of Recruited Informants obtain info during their normal routine. Eg. Manager or waiter

a. Full-time

b. Penetration

c. Ordinary

d. None of these
160. Types of Recruited Informants joins target or recruited within the target itself.

a. Full-time

b. Penetration

c. Ordinary

d. None of these

161. Types of Recruited Informants derived income from work as informant.

a. Full-time

b. Penetration

c. Ordinary

d. None of these

162. The following are the categories of classified matters, except:

a. TOP SECRET – highly sensitive

b. SECRET – sensitive information

c. CONFIDENTIAL – not so sensitive

d. RESTRICTED – not sensitive

e. UNRESTRICTED – Open to any body

163. Any method used to change the form of a written message to make it difficult or impossible for
anyone except the

targeted receiver to read.

a. Code

b. Signs and signals

c. Cryptography

d. Cartography

164. A prearranged secret system of communication in which set symbols or other devices are
substituted for letters,words, phrases, and sentences.
a. Code

b. Signs and signals

c. Cryptography

d. Cartography

165. Any cryptographic system in which arbitrary symbols or groups of symbols represents units or plain
text are pre-arranged or both in accordance with the pre-determine rules.

a. Cipher

b. Cyber

c. Encode

d. Encipher

166. To process a message into a code or cipher. The message would then be called the code text or
cipher test.

a. Cipher

b. Both c and d

c. Encode

d. Encipher

167. The reverse of the encoding process that is performed by a receiver who knows the decoding
method or holds the proper key.

a. Encode

b. Decode or Decipher

c. Key

d. Null

168. Elements of the message that controls the system’s variables

a. Encode

b. Decode

c. Key
d. Null

169. A word, letter or other symbol which has no meaning that is used only to fill the space in a
message.

a. Encode

b. Decode

c. Key

d. Null

170. This concerns the various types of confidential information that filter into the possession of the
police, and the techniques employed in developing these lines of information.

a. Undercover intelligence

b. Line intelligence

c. Tactical Intelligence

d. Departmental Intelligence

171. It is derived from organized information available in the police records division which is concern
police problems of the crime delinquency, vice and traffic.

a. Undercover intelligence

b. Line intelligence

c. Tactical Intelligence

d. Departmental Intelligence

172. Refers to the knowledge essential to the prevention of crimes and the investigation, arrest, and
prosecution of criminal offenders.

a. Internal security intelligence

b. Public safety intelligence

c. Criminal Intelligence

d. None of these
173. Refers to the knowledge essential to ensure the maintenance of peace and order.

a. Internal security intelligence

b. Public safety intelligence

c. Criminal Intelligence

d. None of these

174. Refers to the knowledge essential to ensure the protection of lives and properties.

a. Internal security intelligence

b. Public safety intelligence

c. Criminal Intelligence

d. None of these

175. The intelligence cycle includes the following, except:

a. Planning

b. Collection

c. Processing

d. Dissemination

e. Apprehension

176. A concealed listening or recording device connected to a communications circuit. The act of
installing such a device used for secret listening of conversation under an electronic gadgets.

a. Eaves Dropping

b. Bugging

c. Wire Tapping

d. Tape recording

177. An electronic listening device, such as a hidden microphone or wiretap, used in surveillance.

a. Eaves-Dropping

b. Bugging
c. Wire Tapping

d. Tape recording

178. To listen secretly to the private conversation of others.

a. Eaves-Dropping

b. Bugging

c. Wire Tapping

d. Tape recording

179. Is the analysis of documents written in ancient languages, where the language is unknown, or
knowledge of the language has been lost.

a. Decipherment

b. Decoding

c. Cipher

d. All of these

180. A criminal investigator who is discreetly listening to the conversation of the subjects while the
former is seated on a table near the former’s table is applying:

a. Eavesdropping

b. discreet listening

c. bugging

d. wiretapping

181. If the purpose of the informer in giving information to the police is merely to gain a pecuniary
material, then his motive is _________.

a.Remuneration

b. Repentance of sins

c. Revenge

d. Vanity
182. A form of investigation which the investigator assume a different and unofficial identity in order to
obtain information and locate the criminal.

a. Roping

b. Undercover assignment

c. Surveillance

d. Both a and b

183. A moving surveillance where the subject is kept constantly within view.

a.Close Tail

b. Loose Tail

c. Tight Tail

d. Shadowing

e. Both a and c

184. What is the key to gaining an inside informant from a terrorist group?

a. Knowledge of frustration within the organization

b. Knowledge of the person

c. Knowledge of the person and organization

d. Knowledge of the organization

185. “Dovetail” means __________.

a. Join

b. End abruptly

c. To agitate

d. Taper
186. What is the most difficult challenge for an investigator regarding informants?

a. Tapping outside source

b. Convincing an insider to “spill the beans”

c. Outsourcing information

d. Convincing a peripheral informant to act as witness

187. When people are considered as source of information, the experienced officer:

a. Recognizes that persons from all walks of life represent potential investigative resources

b. Develops his contacts only with law abiding citizens

c. Restricts his efforts to members of the department

d. Concentrates all his efforts to acquire informants only from criminal types

188. A type of informant reveals information usually of no consequences.

a. Mercenary informant

b. False informant

c. Frightened informant

d. Double crosses informant

189. It is an evaluated material of every description, including those derived from observation, reports,
rumors, imagery, and other sources from which intelligence is derived.

a. Intelligence

b. Police intelligence

c. Military intelligence

d. Information

190. Uses his seeming desire to give information as an excuse to talk to the police in order to get more
information from them than he gives.

a. Double crosser informant


b. Self aggrandizing informants

c. False informants

d. Mercenary informants

191. An informant who gives information to the police investigator and his purpose of informing the
police is to eliminate a competition.

a. Rival-elimination informant

b. Mercenary informant

c. Self aggrandizing informant

d. anonymous informant

192. Recuse.

a. Recur

b. Repeat

c. To withdraw

d. rest

193. PO2 Makalibog of the Manila Police District detailed in Intelligence section was assigned in Pier 4,
rendered

duty not wearing a prescribed Police Uniform and working in one of the stevedoring company as laborer
with compensation when visited by his superior. What administrative charges that may be filed against
the former?

a. Double Compensation as he receives salary from the Stevedoring company other than the PNP.

b. Moonlighting as he is also working as laborer while he is employed within the PNP

c. Non-wearing a police uniform when he was inspected by his superior

d. None of the above

You might also like