You are on page 1of 5

Pre-test in POLICE INTELLIGENCE & SECRET SERVICE

MULTIPLE CHOICE (100 items)


Direction: Select the correct answer from the choices enumerated below each number. Encircle the letter that
corresponds to your answer.

1. A philosopher who wrote the book the Art of War, which diverted world philosophy regarding
intelligence gathering from the traditional approach which resorts to prophecy and dream to scientific
methods of information gathering and processes.
a. Alexander the Great c. Sun Tzu
b. Frederick the Great d. Moses
2. Agency vested with handling domestic intelligence in the United States.
a. Federal Bureau of Investigation c. Central Intelligence Group
b. International Police Organization d. Office of Strategic Services
3. Most dangerous kind of informants because they may sell information to the highest bidder.
a. Mercenary informants c. Rival elimination informants
b. Confidential informants d. Double cross informants
4. It would entail the recording or organization of raw materials so that they may be readily compared with
other items.
a. Collation c. Interpretation
b. Evaluation d. Deduction
5. An evaluation code of F4 would mean that the intelligence data is:
a. Unreliable, doubtfully true c. Unreliable, improbable report
b. Reliability unknown, doubtfully true d.Reliability unknown, improbable report
6. Refers to the determination of the significance of the intelligence data in order to draw conclusion.
a. Collation c. Interpretation
b. Evaluation d. Deduction
7. Offensive measures taken to respond to terrorist attacks.
a. Counter intelligence c. Counter terrorism
b. Counter subversion d. Counter insurgency
8. Refers to the information or knowledge pertaining to a person or organization engaged in illegal
activities.
a. Police Strategic Intelligence c. Police Line Intelligence
b. Police Counter Intelligence d. Criminal Intelligence
9. An intelligence material given an evaluation code of A1 would mean:
a. Completely reliable, Confirmed by other sources c. Completely reliable, probably true
b. Usually reliable, Confirmed by other sources d. Usually reliable, probably true
10. It refers to a document, which contains information pertaining to enemy location, movement and possible
actions.
a. Intelligence Journal c. Enemy Situation Map
b. Intelligence Worksheet d. Intelligence Files
11. Refers to a person being protected or the object of secret service.
a. Principal c. Protective security
b. Private individual service d. Decoy
12. Father of Organized Military espionage.
a. Alexander the Great c. Fredrick the Great
b. Hannibal d. Moses
13. It refers to the combination of all analyzed data to form a logical picture or theory.
a. Integration b. Deduction c. Evaluation d. Interpretation
14. It refers to any formula, device pattern or compilation of information utilized in industry.
a. Proprietary information b. Intellectual property c. Trade Secrets d. Formula
15. It refers to clandestine or secret means of obtaining information.
a. Covert Intelligence b. Overt Intelligence c. Infiltration d. Surveillance
16. A step by which the intelligence is transformed from the facts to intelligence data.
a. Collection b. Processing c. Evaluation d. Dissemination
17. A vehicle fronting the principal’s vehicle to neutralize possible threats.
a. Escort vehicle b. Counter attack vehicle c. Decoy vehicle d. Shield vehicle
18. Refers to something that is concealed or hidden.
a. Overt b. Covert c. Crypt d. Code
19. A method of collection of information wherein the investigator trails the subject.
a. Undercover operation b. Surveillance c. Casing d. Research
20. In formulating a fictitious identity, what is the primary consideration?
a. Preliminary investigation of the target c. Familiarize with community
b. Choosing a suitable background or cover to fit the role d. Have fictitious credentials
21. It is the greatest tongue loosener and should be avoided by intelligence agents during missions.
a. Drugs b. Women c. Liquor d. Gambling
22. Information procured in the open is a product of what type of intelligence?
a. Covert b. Overt c. Undercover d. Surveillance
23. This type of intelligence is primarily long range in nature.
a. Counter Intelligence c. Departmental intelligence
b. Line intelligence d. Strategic intelligence
24. If the information is procured without the knowledge of the subject it is said to be:
a. Covert b. Obvert c. Undercover d. Surveillance
25. A common technique used in data description and integration. It demonstrates the chain of event or
activities over a period.
a. Link analysis b. Flowcharting c. Data collection d. Data analysis
26. An intelligence that is immediate in nature.
a. Line intelligence c. Strategic intelligence
b. Counter intelligence d. Combat intelligence
27. Gradual penetration into enemy domain and territory.
a. Surveillance b. Elicitation c. Infiltration d. All of them
28. Wide variety of tactics employed by which a state or person misleads or confuses the enemy; generally
as to its capabilities.
a. Deception b. Espionage c. Sabotage d. Infiltration
29. Forging or changing a person’s real identity.
a. Cover b. Deception c. Defection d. Infiltration
30. Refers to the examination of raw materials to determine its reliable credibility and relevance to
operations.
a. Collation b. Evaluation c. Processing d. Interpretation
31. Measures undertaken to deny the enemy of any information consisting of active and passive intelligence
measures.
a. Combat intelligence c. Line intelligence
b. Strategic intelligence d. Counter-Intelligence
32. Refers to particular requirement for information with the needs user to govern the conduct of operation.
a. Essential information b. Mission order c. Directives d. Intelligence
33. Any form of communicated knowledge, which serves as the bloodline of police intelligence.
a. Information b. Reports c. Crime rate d. Research
34. Regarded as the first person who first utilized the principles of intelligence.
a. Sun Tzu c. Abraham
b. Moses d. Alexander the great
35. A product resulting from the collection, analysis, integration, evaluation and interpretation of all
available information which concerns one or more aspects of are of operation potentially significant to
planning.
a. Assets b. Research c. Intelligence d. Codes
36. Law which was enacted last June 19, 1947 which lead to the creation of the National Bureau of
Investigation.
a. RA 147 b. RA 157 c. RA 6975 d. RA 8551
37. It is undertaken by shifting and sorting of all available intelligence materials.
a. Analysis b. Integration c. Deduction d. Evaluation
38. Indexed memorandum pad for recording of information regarding the enemy, its movement, location and
anticipated action.
a. intelligence journal b. intelligence worksheet c. Enemy situation d. Intelligence files
39. To the military, business, political groups, police and others, intelligence is in general.
a. a means of combating risk to security c. processed information
b. preservation of security d. tactical information
40. To the many dedicated intelligence operatives both clandestine and overt, intelligence to them is—
a. profession b. job c. calling d. all of them
41. To intelligence brokers who sell information at a price, intelligence is a—
a. business b. income generating c. way of life d. all of them
42. Intelligence activity which is dealing all the time
a. undertaking b. action c. information d. hearsay
43. How can a police station with only five (5) policemen undertake intelligence activity?
a. each policeman must perform intel work as additional job
b. one shall be assigned to head the intel unit
c. the COP must act as intel officer at the same time
d. all of the above
44. There are (3) categories of intelligence.
a. strategic, line and counter-intelligence c. tactical, offensive and advance
b. line, strategic and advance d. Tactical, strategic and offensive
45. The detection, prevention and neutralization of any activity are inimical to the harmony and best interest
of the police organization. It is the most important among the categories of intelligence because the
survival of the police unit depends on it.
a. line b. counter-intelligence c. strategic d. none of them
46. The principle that intelligence must be available on time
a. timeliness b. automatic c. punctuality d. suddenness
47. Intelligence operation must be changeable according to the present situation, condition and other factors
a. timeliness b. effectiveness c. flexibility d. none of them
48. In organizing police intel unit, the factor/s to be considered is/are
a. size of the place or area c. extent or prevalence of crimes
b. frequency of seriousness of civil disturbances d. all of them
49. In police intelligence, it is where information is obtained
a. field b. source c. friend d. all of them
50. An individual, an organization or a unit that knows and exploits the sources of intelligence information—
a. collection of agency b. police unit c. personnel d. all of them
51. Source of information can be—
a. informant b. asset c. intelligence broker d. all of them
52. Obtaining information employing means and effort through secrecy, pretending or posing as somebody,
and or through clandestine operation
a. covert b. library technique c. overt d. secrecy
53. Obtaining information without resorting to clandestine operation
a. open source b. surveillance c. covert d. shadowing
54. Obtaining information through newspapers, comics, and the like
a. overt b. clipping c. documentary d. all of them
55. PIR means—
a. Priority Intelligence Requirement c. Preparatory Intelligence Requirement
b. Police Intelligence Requirement d. Intelligence fund
56. IR means—
a. Information Requirement c. Intel Requirement
b. Informant Requirement d. Intel Reservation
57. If the Intelligence unit's current mission is trafficking, the PIR are/is—
a. identities of person involved c. modes of movement and contacts
b. type of drugs being pushed d. all of them
58. Intelligence analysts use a standard system to evaluate the reliability of the agency and the accuracy of
the info. As to reliability it is designated by letters from A to F; whereas, as to accuracy of the info, it is
designated by numbers—
a. 1 to 7 b. l to 6 c. 1 to 5 d. l to 8
59. If information is determined to be such low reliability and poor accuracy, will that be discarded?
a. partly yes b. it depends c. no d. yes
60. Subject information will not be discarded because—
a. it may be found useful and relevant in the future
b. seemingly is important and significant info that may turn out to be the break the police is waiting
for
c. the info may be worthwhile in the near future
d. all of the above

61. The furnishing of intelligence data to other police unit or other government agencies so that they can use
its importance is called
a. distribution b. furnishing c. channeling d. dissemination
62. The main factor why informant gives information to the police is
a. cash b. money c. Peso d. dollar
63. One of the richest sources of info as to events, personalities, ideas, statistics, comments, stories,
situations, opinions and the like
a. magazine b. hearsay c. comics d. newspaper
64. This check is done to verify a person's record entries like in an application for loan, employment, and
others
a. personal record check c. scrutiny check
b. background investigation d. security investigation
65. The best factor in selecting informants or assets
a. integrity b. educational attainment c. intelligence d. access
66. Informants are being contacted—
a. by public telephone b. safe house c. by drop d. all of them
67. Information is transmitted by the informant by placing it in a specified or prearranged place, like on a
table in a restaurant along with a trash napkin is called—
a. trash b. left over c. drop d. all of them
68. Observation of persons, places or things of intelligence value
a. surveillance b. follow-up c. stake out d. none of them
69. In case of motorized surveillance, the thing that should be done
a. use mobile patrol car b. be in full uniform c. use private car d. all of them
70. Kind of surveillance wherein the subject is not aware he is being snooped
a. covert surveillance b. secret surveillance c. shadowing d. none of them
71. Observation of a place like gambling den, drug den, night club, and similar places
a. stationary surveillance b. tailing surveillance c. covert surveillance d. snooped
72. A conference held among the team members before dispatching the agents for intel operation
a. debriefing c. team conference
b. pre-surveillance conference d. all of them
73. The process wherein an informant reveals all info he gathered to the intel officer
a. briefing b. report c. debriefing d. all of them
74. A place or building where agents meet their informants or assets
a. apartment house b. safe house c. empty house d. all of them
75. There are several reasons why an informer is giving information to the police, select the most
common
a. civic-mindedness c. status symbol
b. financial gain d. concerned citizen
76. Which of the four below is a method to disseminate intelligence common in police work?
a. orders c. radio message
b. briefing d. telephone message
77. In selecting an asset, who among below can be chosen as informant?
a. pusher c. user
b. mastermind d. police
78. In intelligence, what is the probable drawback in its successful operation?
a. lack of resourcefulness b. lack of coordination c. lack of personnel d. lack of money
79. Established by Robert Peel in 1829, it was .held as the premier institution in gathering of information
regarding the identity, activities of criminals as well as obtaining evidences and effecting the arrests of
the same.
a. FBI b. NBI c. Scotland Yard d. INTERPOL
80. A vehicle fronting the principal's vehicle to neutralize possible threats.
a. Escort vehicle b. Counter attack vehicle c. Decoy vehicle d. Shield vehicle
81. Refers to the examination of raw materials to determine its reliability, credibility and relevance to
operations.
a. Collation b. Evaluation c. Processing d. Interpretation
82. This refers to duly processed intelligence reports not made available to public consumption.
a. Vital/Top Secret documents c. Secret Documents
b. Confidential documents d. Restricted documents
83. This contains operational procedures and guideline, wherein loss compromise would hamper operations
but may easily be restored.
a. Vital/Top Secret documents c. Secret Documents
b. Confidential documents d. Restricted documents
84. They are considered as irreplaceable official matters' the unauthorized disclosure of which would cause
exceptionally grave damage to the interest of an establishment since it is vital to its survival.
a. Vital/Top Secret documents c. Secret Documents
b. Confidential documents d. Restricted documents
85. Defined as an art and science of making, devising and protecting codes and ciphers.
a. Crypt c. Crypto-analysis
b. Intelligence d. Cryptography
86. The full measure taken by the state to free and protect its own society from lawlessness, insurgency,
terrorism and subversion.
a. Internal defense c. External defense
b. Departmental defense d. Institutional defense
87. This outline the primary threat to national security hence occupies the greatest attention and concern of
intelligence operatives.
a. Bigot list b. Black List c. Order of Battle d. Primary orders
88. In a particular police intel unit, who usually leads the intel unit
a. chief of police b. Intelligence officer c. Operation chief d. Chief of patrol
89. Intelligence plan is a part of
a. police effectiveness b. Police operation plan c. line functions plan d. security plan
90. Intelligence process refers to cyclical steps known in its acronym
a. PCAD b. PACD c. OCAP d. PCDC
91. PCAD is short of
a. planning, collection, analysis and dissemination
b. programming, culturing, auditing and directing
c. Presenting, collection, assuming and development
d. proacting, collating, analysis and delivering.
92. Any knowledge, data, news, opinion and the like transmitted from one person to another is
a. collection data b. intel data c. gathered data d. information
93. AIEI stands for analysis, integration, evaluation and interpretation. Its purpose is to determine that
information is:
a. true and reliable b. correct and worthwhile c. true and accurate d. all of them
94. In analyzing information gathered it will prove__
a. reliability of the source c. dependability of the source
b. trustworthiness d. all of them
95. This check is done to verify a person’s record entries like in an application for loan, employment and
others
a. background investigation c. security investigation
b. personal record check. d. scrutiny check
96. Informant to the police is called:
a. angel b. Salvador c. DPA d. savior
97. The best factor in selecting informants or assets
a. integrity b. educational attainment c. intelligence d. access
98. A forwarding address of a police intel unit where mails, packages and other communications are sent
a. Headquarters b. Accommodation address c. Police address d. Secret address
99. Intelligence fund is a potent source of corruption among officers of the intel units because of
a. it is too big that detection is difficult
b. it is not subject to audit by government auditor
c. it is discretionary on the part of the intel officers to use the fund
d. all of the above
100. A Chinese Philosopher who once said: “If you know your enemy and know yourself, you need not
fear the result of a hundred battles. If you know yourself but not the enemy, for every victory, you will
suffer a defeat. If you know neither yourself nor the enemy, you are a fool who will meet defeat in every
battle.”
a. Confucius c. Chiang Kai-Shek
b. Sun Tzu d. Chun In Lai

---END--

You might also like