Professional Documents
Culture Documents
2. Which of the following is considered the worst terrorist attack in the history of the United States of
America?
A. Attacked of two suicide bombers in the USS Cole while refueling in the Yemeni port of Aden
B. Bombing of Pan American Flight 103 over Scotland in 1988 killing 259 passengers and crew
C. A 4,800 pound truck bomb exploded in front of the AP Murrah Federal Bldg. in Oklahoma City
D. September 11, 2001 crashing of two planes to the twin towers of the World Trade Center in New
York
4. One who make arrangements for killing and injuring physically, economically, and psychologically the
members or non-members:
A. Corruptee C. Enforcer
B. Corrupter D. Politician
6. One who employs acts of terror in a systematic program to obtain what he desires.
A. Criminal C. Enforcer
B. Kidnapper D. Terrorist
8. Refers to the practices, tactics, and strategies that government, militaries, and other groups adopt in
order to fight terrorism.
A. Counter insurgency C. Counter intelligence
B. Counter terrorism D. Interpol
9. Examples of counter terrorist units are: USA – Delta Force; Malaysia VAT 69; United Kingdom – British 22 nd
SAS and the Philippines –
A. Special Action Force C. ISAFP
B. Davao Death Squad D. EOD
10. Refers to a public official, usually not members of the organization family, who can wield influence on
behalf of the organization’s interest.
A. Corruptee C. Boss
B. Corrupter D. Enforcer
11. What is the penalty for a person found guilty of the crime of terrorism?
A. 12 years and I day to 20 years of imprisonment
B. 40 years of imprisonment and the benefit of parole
C. 40 years of imprisonment without the benefit of parole
D. 12 years and I day to 40 years without the benefit of parole
15. Is one who employs acts of terror in a systematic program to obtain what he desires?
A. Insane C. Terrorist
B. Criminal D. Arsonist
16. Which of the following is the reason why the CPP NPA is not categorized as Organized crime Group?
A. They are terrorist dedicated to political change
B. They are fully armed and a threat to national security
C. They have representative in congress
D. They are loved and idolized by other sector of society
17. The following are the best source of illegal profit where the organized crime group gains, except:
A. Alcohol C. Gambling
B. Illegal drugs D. none of these
18. A terrorist method which holds their victims hostage until certain demands are met.
A. Extortion C. Kidnappings
B. Hijackings D. Bombing
19. This is also called computer-based terrorism which involves the sabotaging of computer information
system.
A. Wiretapping C. Cyber-terrorism
B. Counterterrorism D. Nuclear attacks
20. Which of the following is an order issued by Pres. GMA defining the approach and institutional
mechanism for the government’s comprehensive program on combating transnational crime?
A. EO 264 C. EO 265
B. PD 448 D. RA 9372
21. The American General and the first foreigner to be kidnapped by the Red Brigades Terrorists.
A. Gen. Valentine Strasser C. Gen. Cohen Powell
B. Brig. Gen. James Lee Dozier D. Gen. Hermogenes Esperon
22. Initiated the civil war in Sierra Leon under Foday Sankoh which caused the deaths of tens of thousands
and displaced more than two million people because of the nine year conflict
A. Al-Ittihad al-Islami C. Alliance of Democratic Forces
B. Harkat-ul-Mujahideen D. Revolutionary United Front
23. The group that operates in mostly Eastern Democratic Republic of Congo, known as the army of the
ethnic Hutu-dominated Rwandan regime that carried out genocide of 500,000 or more Tutsis and
regime opponents in 1994.
A. Army for the Liberation of Rwanda C. Turkish Hizballah and Jerusalem Warriors
B. Libyan Islamic Fighting Group D. Islamic Army of Aden
24. The breakaway faction of the communist party perceive to have been engaging in some terrorist
activities such as extortions like collection of revolutionary taxes and in some cases killings.
A. Abu Sayyaf Group C. Al-Qaeda Foundation (Philippines)
B. The New People’s Army D. Alex Boncayao Brigade
25. Assassination motivated by beliefs the intended victim is impairing the principle of the assassin and his
associates.
A. Ideological causes C. Economic causes
B. Revolutionary causes D. Psychological causes
26. The killing of President Morales of Bolivia in 1872 is attributed to which of the following causes?
A. Personal causes C. Psychological causes
B. Mercenary causes D. Revolutionary causes
27. The adversary holds a hostage in order to obtain concessions from the government and/or for money.
Which of the following method of action is used?
A. Kidnapping C. Blackmail
B. Threats D. Physical assault
28. Which of the following causes of assassination motivated John Wilkes Booth and his confederates to
assassinate President Lincoln?
A. Revolutionary C. Psychological
B. Economic D. Ideological
29. The protective force should always try to operate in such a manner that any attempted attack will have
the smallest possible chance to succeed. Which of the following concept is true?
A. Protection is surprise proof C. Absolute protection is seldom possible
B. Absolute protection is always possible D. Absolute protection is never possible
30. It refers to the basic cause of assassination whereby assassins committed it for monetary reward.
A. Missionary causes C. Ideological causes
B. Mercenary causes D. Personal causes
33. A valuable method of documenting the crime scene that is use in ascertaining the facts of the case.
A. Examination C. Photograph
B. Sketch D. Interview
34. It is used to ascertain if the theory of the case is substantiated by what the crime scene operative
observes.
A. Interview C. Sketch
B. Examination D. Photograph
35. It documents the overall view and items of evidence in the crime scene.
A. Sketch C. Crime scene preservation
B. Photograph D. Investigation report
36. Which of the following method demonstrates the layout of the crime scene; identify the exact position
of the evidence within the crime scene?
A. Sketch C. Investigation Report
B. Photograph D. Affidavit of witness
38. Who among the following bears the responsibility to develop cyberspace security awareness and
training program?
A. Government C. Home users
B. Hackers D. Private Corporations
39. It refers to a small device that can include computing, telephone, fax, paging, networking and additional
features like memory, disk drives, PC Cards slots and modem.
A. Digital camera C. Central Processing Unit
B. Scientific Calculator D. Personal Digital Assistant
40. It refers to a sealed box with disks coated with a substance used to store data magnetically.
A. Digital camera C. Software
B. Hard drives D. Hardware
41. A digital device for recording images and video accompanied by storage device and conversion
hardware for transferring images and video.
A. Central processing unit C. Digital camera
B. Electronic data processing D. Video camera recorder
42. It include the systematic use of physical violence, either actual or threatened against noncombatants to
create a climate of fear and cause some religious, political or social change:
A. Kidnapping C. Extremism
B. Insurgency D. Terrorism
43. The following are groups declared as domestic terrorist by the Human Security Act, except:
A. CPP-NPA C. Al-Qaeda
B. Abu Sayyaf Bandit Group D. Religious extremist
44. A criminal activity by an enduring structure or organization developed and devoted primarily to the
pursuit of profits through illegal means.
A. Kidnapping C. Organized Crime
B. Terrorism D. Syndicate
45. The mafia’s code of secrecy, and informal, unwritten code of organized crime, which demand silence
and loyalty, among other things, of family members.–
A. Omerta C. Honor Code
B. Code of silence D. Secrecy
46. It refers to terrorism that initiates, or threatens to initiate, the exploitation of or attack on information
systems.
A. Comp terrorism C. Cyber terrorism
B. Enviroterrorism D. Technological terrorism
48. It includes the systematic use of physical violence either actual or threatened against noncombatants to
create a climate of fear and cause some religious political or social change.
A. Kidnapping C. Extremism
B. Insurgency D. Terrorism
49. This is a term used to describe the relationship a hostage can build with their kidnapper.
A. Stock room syndrome C. Stockholm syndrome
B. Attraction syndrome D. Proximity syndrome
50. Syndicates involved in kidnapping usually have modus operandi in their operation, this involves the
following stages, except:
A. spotting C. risk analysis and target selection
B. surveillance D. targeting