You are on page 1of 4

MIDTERM EXAM IN LEA-3 b.

Threat
c. Risk
d. Vulnerability
7. The level of management that refers to
INSTRUCTIONS: subordinate departmental heads,
1. WRITE YOUR NAME AND BLOCK foremen, office superintendents,
IN THE ANSWER SHEET. supervisors, etc.
2. SHADE THE SET OF YOUR a. Top
EXAMINATION. SHADE SET A OR b. Mid-range
SET B. c. Middle
3. SHADE THE LETTER OF YOUR d. Lower
OWN CHOICE IN THE ANSWER 8. The level of management that comprises
SHEET. of departmental heads and other
4. STRICTLY NO ERASURE, ANY executives.
ERASURE WILL BE MARK AS a. Top
WRONG. b. Mid-range
5. PRAY BEFORE YOUR ANSWER c. Middle
THE EXAMINATION! d. Lower
9. The following are the principal
SET B functions of the top management,
except.
QUESTIONS: a. Organizing for action
b. Eliminating wastage of material
1. The use of force or violence against c. Developing of major resources
persons or property for purpose of d. Formulation of policies
intimidation, coercion or ransom. 10. The following are the principal
a. Threat functions of the lower management,
b. Crime except.
c. Terrorism a. Executing of the work entrusted
d. Kidnapping to them
2. The unauthorized access to the b. Maintaining of the standard,
installation, data, or devices. quality and etc.
a. Threats to identity c. Preserving the morale of the
b. Threats to intrusion workers
c. Threats to integrity d. Long range planning and
d. Threats to confidentiality strategy
3. The most fundamental aspect of 11. The following are under the Produce
protection. and maintain security policy, except.
a. Financial security a. Assess business policies and
b. Physical security plans
c. Home security b. Analyze request for information
d. Human security c. Assemble and communicate
4. The exposure to the chance of injury or security policy
loss. d. Assess regulations and
a. Mitigation standards
b. Threat 12. The following are not under Monitor,
c. Risk Assess, Audit, and Report Security,
d. Vulnerability except.
5. The process of evaluating the a. Collect feedback
probabilities and consequences of risk b. Deny request
event if they are realized. c. Define and build report
a. Defense in depth d. Review asset inventory
b. Countermeasure 13. The word ______derived from the Latin
c. Target hardening word secures which means freedom
d. Assessment form anxiety.
6. The method that triggers a risk which is a. Security
either natural cause or human induced. b. Secure
a. Mitigation
c. Management 23. The type of security manager that
d. Manage genuinely concerned with the emotional
14. The first woman hired as detective in well-being of their workers.
1856 is _____________. a. The visionary
a. Kate Warne b. The commander
b. Kate Pinkerton c. The democratic boss
c. Allen Pinkerton d. The sensitive boss
d. Allen Warne 24. The type of security manager that is one
15. The state of the mind by which a person of the easiest types of managers to work
see or feel absence of danger and with.
presence of comfort. a. The visionary
a. Security b. The commander
b. Secure c. The democratic boss
c. Management d. The sensitive boss
d. Manage 25. The type of security manager that listens
16. The branch of information security to ideas and take note of what they are
applied to both theoretical and actual trying to achieve.
computer systems. a. The visionary
a. Computer security b. The commander
b. Information security c. The democratic boss
c. Computing security d. The sensitive boss
d. Application security 26. The most important of all resources.
17. The branch of computer science that a. Manpower
addresses enforcement of secure b. Machineries
behavior on the operation of computers. c. Materials
a. Computer security d. Methods
b. Information security 27. This refers to standards and procedures
c. Computing security used as techniques of production.
d. Application security a. Manpower
18. According to _______ there are five b. Machineries
functions of management relevant to c. Materials
security organizations. d. Methods
a. Henry Fayol 28. The way to stop a threat from triggering
b. Henri Fayol a risk event.
c. Kate Pinkerton a. Defense in depth
d. Katy Pinkerton b. Countermeasure
19. The looking ahead, drawing up a good c. Target hardening
plan of action. d. Assessment
a. Organizing 29. The means of reducing risk of loss from
b. Commanding the occurrence of any undesirable event.
c. Coordinating a. Mitigation
d. Planning b. Threat
20. The organizational structure with a good c. Risk
division of functions and tasks is of d. Vulnerability
crucial importance. 30. The state of being open to injury or loss.
a. Organizing a. Mitigation
b. Commanding b. Threat
c. Coordinating c. Risk
d. Planning d. Vulnerability
21. The harmonization of activities in an 31. The approach to security in which a
organization that leads to efficient series of defensive mechanisms are
function. layered in order to protect the asset.
a. Organizing a. Defense in depth
b. Commanding b. Countermeasure
c. Coordinating c. Target hardening
d. Planning d. Assessment
22. The clear working instructions to 32. The proper utilization of resources in a
employees so they would know exactly security organization in order to meet
what is required of them. organizational goals and objectives and
a. Organizing to ensure their achievements.
b. Commanding a. Security
c. Coordinating b. Management
d. Planning c. Security management
d. Secure management 42. The personal interests are subordinate to
33. It is about obedience. the interest of the organization.
a. Order a. Stability of personnel Tenure
b. Equity b. Subordination of individual
c. Discipline interest
d. Initiative c. Degree of centralization
34. The employees in an organization must d. Spirit de corps
have the right resources at their disposal 43. The deployment and managing of
so that they can function properly in an personnel should be in balance with the
organization. service that is provided from the
a. Order organization.
b. Equity a. Stability of personnel Tenure
c. Discipline b. Subordination of individual
d. Initiative interest
35. The employees are allowed to express c. Degree of centralization
new ideas. d. Spirit de corps
a. Order 44. The management and authority for
b. Equity decision-making process must be
c. Discipline properly balanced in an organization.
d. Initiative a. Stability of personnel Tenure
36. The employees must be treated kindly b. Subordination of individual
and equally. interest
a. Order c. Degree of centralization
b. Equity d. Spirit de corps
c. Discipline 45. The level of management that is usually
d. Initiative made up of Board of Directors.
37. The management should strive for the a. Top
involvement and unity of the employees. b. Mid-range
a. Stability of personnel Tenure c. Middle
b. Subordination of individual d. Lower
interest 46. The following are not under plan and
c. Degree of centralization implement security practices, except.
d. Spirit de corps a. Document security violation
38. The type of IT field which means b. Complete security plan
protecting information and information c. Assess Process execution
systems from unauthorized access, use, d. Identify security threats
disclosure, and etc. 47. The following falls under Evaluate
a. Computer security Security Management Performance,
b. Information security except.
c. Computing security a. Produce process measurements
d. Application security b. Review existing documentation
39. The measures that prevent or deter c. Audit process
attackers from accessing a facility, d. Monitor change
resources, of information stored on 48. The following are not under analyze
physical media is________. security threats, vulnerabilities and risks,
a. Financial security except.
b. Physical security a. Define security plan schedule
c. Home security b. Perform protection request
d. Human security c. Develop security
40. The methods use of protecting recommendations
residential homes or town sites. d. Generate and communicate
a. Financial security report
b. Physical security 49. The following are not under Classify
c. Home security information asset security, except.
d. Human security a. Collect evaluation results
41. The methods applied for the protection b. Communicate to stakeholders
of fungible, negotiable instrument c. Assess process framework
representing financial value. d. Review asset inventory
a. Financial security 50. The type of security manager that want
b. Physical security the job to be done on time and to the
c. Home security highest standards possible.
d. Human security a. The visionary
b. The commander
c. The democratic boss Psalms 46:1 “God is our refuge and
d. The sensitive boss strength, a very present help in trouble.”

Take heart all this is possible and


attainable! You can do it!

You might also like