You are on page 1of 5

POLICE INTELLIGENCE REVIEW EVALUATION

1) He was a Chinese warlord who wrote the book, “The Art of War” considered being the most
influential book on warfare.
a) Mao Tse Tung b) Lao Tse c) Sun Tzu d) Confucius
2) He is the first recorder intelligence officer who made use of intelligence to gather information during
biblical times. a) Abraham b) Moses c) Joshua d) Caleb
3) He was England’s ambassador to Spain and France in the Victorian era who was the first to us an
embassy as an intelligence post. a) Sir Francis Walshingham c) Sir David Bechman
b) Sir Winston Churchill d) Sir Richard The Lion Hearted
4) The coding machine used by the Germans during World War II which was decoded by the British
intelligence.
a) Enigma Code b) PDX Code c) De Fuhrer Code d) Third Reich
5) It refers to war information.
a) Statistics b) Data c) Intelligence d) Figures
6) It refers to processed information.
a) Statistics b) Data c) Intelligence d) Figures
7) The standard used in evaluating information.
a) Information matrix c) Alpha-numeric system
b) Admiralty scale d) Information scale
8) This phase aims to answer the 5Ws and 1H.
a) Data analysis b) Data collation c) data evaluation d) Data inspection
9) The processing of information before it can be classified as intelligence is called the:
a) Information cycle c) Intelligence process
b) Intelligence network d) Intelligence cycle
10) A category in intelligence, which includes both strategic and combat intelligence.
a) National b) Political c) Security d) Military
11) This is concerned with the protection or existing intelligence from unauthorized access and
dissemination.
a) Strategic b) Combat c) Military d) Counter Intelligence
12) The following are components of strategic intelligence, EXCEPT
a) Political b) Economic c) Historical d) Geographical
13) The following are the missions of NICA, except;
a) Prepare intelligence estimates for local and foreign situations for the formulation of national
policies by the President.
b) Serve as the focal point for coordination and integration of national intelligence activities.
c) Act as the repository of all intelligence for the various departments.
d) Provide mission support to the nation security council.
14) NICA is headed by the;
a) Director-General b) Director c) Chairman d) Secretary
15) The head of the NICA is appointed by the:
a) President, subject to the confirmation of Congress. c) Chief of Staff, Armed Forces of the
Philippines
b) Secretary of the Department of National Defense. d) President
16) NICA stands for:
a) National Intelligence Command and Administration c) National Intelligence Coordinating
Agency
b) National intelligence Center and Administration d) National Intelligence Community
Agency
17) NIE stands for:
a) National Intelligence Examination c) National Intelligence Evaluation
b) National Intelligence Estimation d) National Intelligence Estimate
18) It is the origin of information
a) Resource person or material b) Informant c) Informer d) Source
19) These are the persons who give information to an investigation, whether for monetary consideration
or as result of the investigation itself: a) Informants b) Informer c) witnesses
d) Suspects
20) In evaluating information, the alpha symbols represent the ___ of information.
a) Description c) Accuracy
b) Reliability of the source d) Reliability
21) In evaluating information, the numeric symbols represent the ___ of information.
a) Description c) Accuracy
b) Reliability of the source d) Reliability
22) When an information is said to be “Fairly Reliable-Improbable”, it is classified as:
a) B-5 b) C-5 c) C-4 d) E-6
23) When an information is said to be “Unreliable-Truth cannot be Judge”, it is classified as:
a) D-5 b) E-5 c) E-6 d) D-6
24) When an information is said to be “Usually Reliable-Probably True”, it is classified as:
a) A-2 b) A-3 c) B-2 d) B-3
25) The chief assist of an investigator is his ability to:
a) Respond as timely as possible to the scene of the crime c) Earn the trust of the witnesses
b) Establish rapport with the complainant d) Secure information
26) When an information is discovered to be inaccurate, the investigator should no longer consider all
other information from the same source. a) True b) False c) Maybe d)
Maybe not
27) It is the covert observation of places, persons and vehicles for the purpose of obtaining information:
a) Surveillance b) Casing c) Undercover investigation d) Surreptitious entry
28) It is act of following a person
a) Close surveillance b) Loose surveillance c) Tailing or shadowing d) Roping
29) This should not be attempted until all other investigative techniques have been utilized.
a) Discreet surveillance b) Close surveillance c) Tailing or shadowing d) Roping
30) It is another term for investigation.
a) Surveilling b) Tailing c) Sleuthing d) Roping
31) It is another term for undercover investigation:
a) Infiltration b) Sleuthing c) Deep cover d) Roping
32) A type of surveillance according to method where the surveillance follows the subject from place to
place in order to maintain uninterrupted watch over the subject. a) Technical b) Close
c) discreet d) Moving
33) It is a kind of surveillance in which the most common procedure is the ABC method.
a) Vehicular b) Foot c) stationary d) Loose
34) As a general rule, direct eye contact with the subject should be avoided by the surveillant.
a) True b) Partly true c) False d) Partly false
35) When following the subject in a crowded elevator, the surveillance should as much as possible get off
the same floor as the subject.
a) True b) Partly true c) False d) Partly false
36) In discreet surveillance, when the subject clearly indicates that he has become aware that he is being
followed and observed, the surveillant must immediately abort operations and report to the control
point.
a) True b) Partly true c) False d) Partly false
37) In close surveillance, when the subject clearly indicates that he has become aware that he is being
followed and observed, the surveillant must immediately abort operations and report to the control
point.
a) True b) Partly true c) False d) Partly false
38) It is another term for casing:
a) Undercover investigation b) Reconnaissance c) Covert observation d)
Surveillance
39) The following are methods of casing, EXCEPT:
a) Word-of-mouth b) Research c) Personal d) Map
40) It is a form of investigation in which the investigator assumes a different identity in order to obtain
information.
a) Undercover investigation c) Deep cover assignment
b) Infiltration d) Extraction operation
41) When an agent’s cover has been blown and he is in danger of being captured by the enemies, he is
said to have been: a) Compromised b) Detected c) Beyond salvage d) Sacrifice
42) Words or phrases used to refer to, or identify, undercover operatives:
a) Password b) Code word c) Access mode d) Secret code
43) Procedures and practices designed to ensure that each member knows only that which he needs to
know about the personnel, structure and activities of the organization.
a) Compartmentation b) Clandestine c) Concealment d)
Classification
44) The outward status by a person, organization or installation to disguise clandestine activities.
a) Deep cover b) Cover c) disguise d) Alias
45) Intelligence information, which is not practical and immediate operational value but rather long
range, is known in police work as: a) Counterintelligence b) Line c)
Strategic d) Departmental
46) Any processed information coming from open and covert sources that affect police operation and
harmony with the community and other government agencies is:
a) Counterintelligence b) Line c) Strategic d) Departmental
47) It connotes “security consciousness”
a) Counterintelligence b) Line c) Strategic d) Departmental
48) EEI means:
a) Evaluated and examined information c) Essential evaluation of information
b) Examination essential in intelligence d) Essential elements of information
49) It is an individual who gives information for a price or reward:
a) Criminal informant b) Informer c) Anonymous informant d) Plain
information
50) It is the Anti-Wiretapping Law.
a) R.A. 4200 b) R.A. 4020 c) R.A. 4002 d) R.A. 2400
51) It is the destruction or impairment of buildings, installations, places or things used or held for
defensive purposes.
a) Counter sabotage b) Sabotage c) Terrorism d) Destabilization
52) This is on of the most effective methods of sabotage because it causes complete destruction,
concealment of evidence and availability of means:
a) Biological b) Explosive c) Mechanical d) Incendiary
53) This method of sabotage requires technical skill in the preparation of materials:
a) Biological b) Explosive c) Mechanical d) Incendiary
54) It is the easiest method of sabotage to employ and one of the must difficult to detect:
a) Biological b) Explosive c) Mechanical d) Incendiary
55) A ___ is a person who goes against his own country.
a) Traitor b) Spy c) defector d) Enemy
56) He is the “ Father of Organized Military Espionage”
a) Sir Francis Walshingham b) Napoleon Bonaparte c) Hannibal d) Frederick the Great
57) He is an agent who has been recruited by an intelligence service within a highly sensitive target.
a) Penetration agent b) Double agent c) Agent in place d) Expendable agent
58) He is an agent through whom false information is leaked to confuse the enemy.
a) Penetration agent b) Double c) Agent in place d) Expendable agent
59) A person who has distinguishing features and who stands out in crowd best fits the characteristics of a
good surveillance officer. a) True b) Maybe true c) False d) Maybe false
60) It is designed to cultivate inner strength in an agent’s personality, to impress upon him basic nobility
of his effort and to develop loyalty and reliability in him:
a) Education b) Training c) Orientation d) Indoctrination
61) The art of war is governed by the following factors, EXCEPT:
a) Moral law b) Heaven c) Commander d) Universe
62) What is the supreme excellence in warfare?
a) “To withstand a protracted battle with a minimal loss” c) “To fight and conquer an all your battles”
b) “Breaking the enemy’s resistance without fighting” d) “ To be strong and end up victorous”
63) Sun Tzu likened the energy to:
a) Bending a cross bow c) Bending of the knees
b) Bending of a crow bar d) Bending of an iron
64) According to Sun Tzu, the following are some factors courting defeat, EXCEPT:
a) Neglect to estimate enemy’s strength c) Defective training
b) Want of authority d) Observance of discipline
65) Which of the following statement is true?
a) “If you know yourself and the enemy, you need not fear the result of a result a hundred battles. If
you know yourself but not the enemy, for every victor gained you will suffer a defeat. If you know
neither the enemy nor yourself, you will succumb in every battle”
b) “If you know the enemy and know yourself, you need not fear the result of a result a hundred
battles. If you know the enemy but not yourself, for every victor gained you will suffer a defeat. If
you know neither the enemy nor yourself, you will succumb in every battle”
c) “If you know the enemy and know yourself, you need not fear the result of a result a hundred
battles. If you know yourself but not the enemy, for every victor gained you will suffer a defeat. If
you know neither the enemy nor yourself, you will succumb in every battle”
d) “If you know the enemy and know yourself, you need not fear the result of a result a hundred
battles. If you know yourself but not the enemy, for every victor gained you will suffer a defeat. If
you know neither the enemy nor yourself, you will succumb in every battle”
66) Recklessness is one dangerous fault of a general that may lead to destruction and cowardice is
another, which may lead to: a) Capture b) Death c) Defeat d) Surrender
67) It is the art and science of making, devising, inventing or protecting codes and cipher:
a) Cryptography b) Cyptoanalysis c) Cyptogram d) Cryptograph
68) It is the art and science of breaking codes and ciphers:
a) Cryptography b) Cyptoanalysis c) Cyptogram d) Cryptograph
69) This refers to the several options available to a country that may be employed in obtaining its national
objectives.
a) Vulnerabilities b) Capabilities c) Probable courses of actions d) Options
70) Intelligence activities are based on reasons and judgment, and not on fixed procedures. This is the
essence of:
a) Security b) Use c) Timeliness d) Flexibility
71) Intelligence must be adequate for the purpose for which is to be utilized. This is the essence of:
a) Security b) Use c) Timeliness d) Flexibility
72) Intelligence must reach the user in time to serve as a basis for appropriate action. This is the essence
of:
a) Security b) Use c) Timeliness d) Flexibility
73) It is the determination of the pertinence, reliability and accuracy of the information.
a) Interpretation b) Hypothesis c) Evaluation d) Analysis
74) It is a temporary graphic display of the current dispositions and major activities of the enemy:
a) Intelligence b) Situation map c) Intelligence map d) Journal
75) It is a permanent chronological record of reports and messages, of important events that have
occurred of the actions taken in response, covering a stated period, usually twenty four (24) hours.
a) Intelligence b) Situation map c) Intelligence map d) Journal
76) It is a systematic arrangement by subject heading which aids in the sorting, evaluation and
interpretation of information and in the preparation of intelligence reports:
a) Intelligence b) Situation map c) Intelligence map d) Journal
77) It is the timely conveyance of information and or intelligence in an appropriate form and by any
suitable means to those who need it: a) Dissemination b) Collection c) Distribution
d) Analysis
78) It is a process of developing a method, a procedure or an arrangement of parts to achieve a definite
objective:
a) Collection effort b) Collation c) Integration d) Planning
79) Police operation and intelligence are interdependent.
a) True b) Wholly true c) False d) Wholly false
80) Military intelligence is the single, most important component of strategic intelligence.
a) True b) Wholly true c) False d) Wholly false
81) It is the forerunner of the CIA:
a) Organization of Special Services c) Office of Secret Services
b) Office of Special Services d) Office of Strategic Services
82) This component deals with the extent and utilization of the natural and human resources and the
industrial potential of nations: a) Telecommunications b) Political c) Economic d) Scientific
83) This deals with the progress of scientific research and development as it affects a nation’s potential:
a) Telecommunications b) Political c) Economic d) Scientific
84) This centers on the study of population and manpower, national characteristics, labor, public opinion
and public welfare: a) Social b) Sociological c) Civic d) Socio-civic
85) Intelligence is useful, but not indispensable in a nation’s progress.
a) True b) Wholly true c) False d) Wholly false
86) These are open sources of information.
a) Covert sources b) Deception c) Overt sources d) Loose
87) These include confidential informants:
a) Covert sources b) Deception c) Overt sources d) Loose
88) It contains a record copy of each message or document noted in the journal:
a) Journal file b) Journal c) Information file d) Reference file
89) All information of possible future value is cross-indexed in this file:
a) Information or reference file c) Journal file
b) Information or reference index d) Journal
90) It means the probable truth of the information:
a) Suitability b) Reliability c) Accuracy d) Probability
91) This complements ground surveillance and is characterized by a capability to extend line of sight:
a) Combat b) Ground c) Amphibian d) Aerial
92) This involves the orderly and persistent observation of chosen places, road way or no-moving
installations:
a) Reconnaissance c) Surveillance
b) Ground surveillance d) Aerial surveillance
93) CIA stands for:
a) Command Intelligence Administration c) Counter Intelligence Agent
b) Central Intelligence Administration d) Central Intelligence agency
94) It is a critical appraisal of information as a basis for its subsequent interpretation, which includes
determining the pertinence of information, the reliability of the source and agency through which the
information was derived and its accuracy.
a) Interpretation b) Evaluation c) Tasks d) Operation
95) Determines the significance of the information with respect to what is already known, and it draws
conclusions as to the probable meaning of the evaluated information; it is the result of critical
judgment involving analysis, integration and forming of conclusions.
a) Interpretation b) Evaluation c) Tasks d) Operation
96) It is the proper, economical, and productive use of personnel, resources, and equipments and/or
utilized in planning the collection of information, processing of information and dissemination of
intelligence.
a) Cardinal Principle of Intelligence c) Assets and liability Intelligence
b) Economic Intelligence d) Income and Expenditure Intelligence
97) It is a form of investigation in w/c the investigator assumes a different and unofficial identity in order
to obtain information.
a) Roping or Undercover Work c) Interviews
b) Crime scene search d) Interrogation
98) A trained police personnel who penetrated certain organization suspected of illegal activities.
a) Informant b) Undercover work c) Confidential agent d) Intelligence officer
99) A place, a building, enclosed mobile, or an apartment, where police undercover meet his agent for
debriefing or reporting purpose.
a) Safe house b) Intelligence office c) Confidential house d) None of these
100) It is a convenient, secure and unsuspecting place where a police undercover man, informer, or
informant by prearrangement leaves a note a small package to another agent.
a) Accommodation address b) Drop c) Intelligence note d) Information

You might also like