You are on page 1of 5

Republic of the Philippines 6. What is meant by an evaluation of C-1?

University of Southern Mindanao a. information comes from an unreliable source and


Kabacan, Cotabato is probably true
b. information comes from a fairly reliable source and
COLLEGE OF ARTS AND SOCIAL SCIENCES is confirmed by other sources
Department of Criminal Justice Education c. information comes from an unreliable source and
is improbable
FUNDAMENTALS IN CRIMINAL INVESTIGATION d. information comes from an unreliable source and
AND INTELLIGENCE is doubtfully true
Final Examination
May 2023 7. PEMS Edna E. Castro evaluated the information
gathered as “completely reliable, source probably
TEST I: MULTIPLE CHOICE: true”. What is the type of evaluation?
INSTRUCTION: READ THE QUESTION AND a. A-5 c. A-4
CAREFULLY SHADE THE LETTER OF YOUR b. A-1 d. A-2
CHOICE.STRICTLY NO ERASURE.
8. A report made after conducting a security survey
1. Which of the following is the correct order of the on any installation, building, camp, officer or
phases of intelligence cycle? p.65 area.
I. Planning the collection effort a. security training c. security survey
II. Dissemination and Use of Information b. security check d. security education
III Collection of Information
IV. Processing the Collected Information 9. When one procures information about
subject secretly; he is performing _______
a. I,II,II,IV c. IV, III, II, I collection method.
b. I, III, IV, II d. II, I, IV, III a. routine c. active
b. overt d. covert
2. PSgt. Peter Factor is assigned to collect available
information concerning the activities of the Red 10. To what unit do policeman in plain clothes
Scorpion Group (RSG). He is with what unit of
belong when they infiltrate and gather
the police?
a. anti – juvenile delinquency
information about criminal syndicates?
a. Budget c. Intelligence
b. criminal investigation
b. Planning d. Patrol
c. intelligence operations
d. patrol activities
11. It is converted into an encoded message into its
equivalent plain or original plain text by means of
3. Which agent who has reached the enemy and
code system.
able to get information and would be managed to
a. Decipher c. Label
get back?
b. Cryptology d. Decode
a. mercenary c. penetration
b. infiltration d. assassin
12. The recruitment of action agent inside the target
4. A-2 in Intelligence report means? organization
a. usually reliable source and is confirmed by a. casing c. penetration
other sources b. undercover operation d. surveillance
b. complete reliable source and Probably true
c. complete reliable source and 13. The covert observation of an area, a building or
usually reliable stationary object to gain information is called:
d. completely reliable source and confirmed a. undercover works c. casing
by other sources b. penetration d. surveillance

5. PSSgt. Juan Tupaz submitted an intelligence 14. It is a system or plan whereby information of
intelligence value is obtained through the process
report evaluated as B – 5. What does that mean?
direct intercommunication in which one or more
a. information is usually from a reliable source of the parties is unaware of the specific purpose
and is possibly true of the conservation.
b. information is usually from a reliable source a. Elicitation c. Roping
and is improbable b. Surveillance d. Undercover Operations
c. information is usually from a reliable source
and is probably true 15. It is a type of Agent used in collecting information
d. information is usually from a reliable source who leaks false information to the enemy.
and is doubtfully true a. Double Agent c. Agent of Influence
b. Expendable Agent d. Penetration Agent

16. The core of intelligence operations is-


a. Dissemination c. Mission
b. Analysis d. Planning
17. He is regarded as the "Father of Organized 27. Refers to the observations of person’s
Military Espionage". movements.
a. Alexander the Great a. Plant c. Casing
b. Karl Schulmeister b. Stakeout d. Tailing or Shadowing
c. Frederick the Great
d. Arthur Wellesley 28. It is a process or method of obtaining information
from a captured enemy who is reluctant to
18. There are four categories of classified matters; divulge information.
top secret, secret, confidential, and restricted. To a. Interview
distinguish, their folder consists of different b. Interrogation
colors. What will be the color of the document c. Forceful Interrogation
which requires the highest degree of protection? d. Tactical Interrogation
a. Red c. Blue
b. Black d. Green 29. The purpose of evaluation and analysis is to
determine if the information is true and-
19. What verse of the Holy Bible that includes the a. Reliable c. Correct
biblical indication of the beginning of b. Proper d. Probably true
Intelligence?
a. Number 13:17 c. Number 17:13 30. It refers to a place, building or enclosed area
b. Number 3:17 d. Number 17:3 where police undercover men meet for debriefing
or reporting purposes.
20. It is a type of intelligence activity which deals with a. Safe house c. Live Drop
defending the organization against its criminal b. Log d. Decoy
enemies?
a. Line Intelligence c. Strategic Intelligence 31. It is the careful inspection of a place to determine
b. Counter-Intelligence d. Tactical Intelligence its suitability for a particular operational purpose.
a. Casing c. Rough Shadowing
21. It is a form of investigation in which the operative b. Loose Tail d. Stakeout
assumes a cover in order to obtain information
a. Overt operation c. Undercover assignment 32. A method of collecting information thru
b. Covert operation d. clandestine operation interception of telephone conversation.
a. Bugging c. Code name
22. It is the art of science which treats the various b. Wire Tapping d. Decoy
man and methods for rendering plain text
unintelligible, and reconverting unintelligible 33. It is defined as evaluative and interpreted
language by means other than cryptanalysis. information concerning organized crime and
a. Cryptography c. Cryptocurrency other major police problems.
b. Crypto Analyst d. Cryptechnician a. Military Intelligence c. Police Intelligence
b. Military Information d. Police Investigation
23. If the information or documents are procured
openly without regard as to whether the subject 34. The term appropriate for someone who gives
of the investigation becomes knowledgeable of information in exchange for a reward is:
the purpose or purposes for which it is being a. Informer c. Special informer
regarded. b. Informant d. Confidential Informant
a. Overt Operation c. Covert Operation
b. Surveillance d. Analysis 35. Is the reduction of information into writing or
some other form of graphical representation and
24. The type of intelligence that is immediate in the arranging of this information into groups
nature and necessary for more effective police related items.
planning. a. Recording c. Analysis
a. Line Intelligence b. Integration d. Demonstration
b. Strategic Intelligence
c. Police Intelligence 36. It refers to the person who conducts the
d. Departmental Intelligence surveillance.
a. Surveillant c. Interrogator
25. It refers to the combination of all analyzed data to b Subject d. Interviewee
form a logical picture or theory.
a. Integration c. Deduction
b. Evaluation d. Interpretation 37. Those documents place on a Blue Folder is
considered as:
26. It is claimed that 99% of information is obtained a. Top Secret c. Restricted
from conspicuous sources and 1% of information b. Secret d. Confidential
is obtained from clandestine sources.
Clandestine means. 38. Documents which are classified as Secret should
a. Observable c. Visible be placed on-
b. Overt d. Covert a. Blue Folder c. Green Folder
b. Black folder d. Red Folder
39. It is a certification by a responsible authority that 48-50 Situation: Mr. James is a deep penetration
the person described is cleared to access and agent of the PNP, during the conduct of his mission,
classify matters at appropriate levels. he was caught and apprehended by the rebels.
a. Security Clearance When he was still in the custody, the rebels political
b. Document Clearance indoctrinated him with their political motives. After
c. Interim Clearance few months of indoctrination, he was sent back to the
d. Background Investigation organization and tasked to gather vital information.

40. M evaluates the information as usually reliable 48. What kind of agent is Mr. James?
and probably true. a. expendable agent c. double agent
a. C-4 c. B-2 b. agent in captured d. agent of influence
b. B-3 d. C-5
49. If Mr. James is a spy, to what classification of spy
41. Refers to the subject or a person being followed according to Frederick the Great does he
a. surveillant c. Rabbit belong?
b. Target d. Subject a. common spy c. spy of consequences
b. spy of intimidation d. double spy
42. Regarded as the first person who first utilized
the principles of intelligence. 50. What is the type of intelligence operation
a. Sun Tzu c. Abraham conducted by Mr. James?
b. Moses d. Alexander the Great a. Overt operation c. Covert operation
b. Reverse operation d. Cryptography
43. This is a recording device wherein different
information are entered and collated in 51. It refers to any person in a convenient, secure,
preparation for its final processing. and unsuspecting place where police undercover
a. Intelligence journal men meet their action agent for debriefing or
b. Intelligence worksheet reporting purposes.
c. Enemy situation map a. Surveillant c. Drop
d. Intelligence files b. Convoy d. Decoy
44. It is the art of science which treats the various 52. It is the observation of places or areas from a
means and methods for rendering plain text fixed point.
unintelligible, and reconverting unintelligible a. Fixed or Post c. Contact
language by means other than cryptanalysis. b. Stake-out or Plant d. Stationary
a. Crypt c. Crypto analysis
b. Intelligence d. Cryptography 53. An accomplice or companion who helped the
subject evade or escape the surveillant.
45. The unauthorized disclosure of this document a. decoy c. contact
would cause exceptionally grave damage to the b. convoy d. cover story
nation, politically, economically, or from a security
aspect. 54. The subject person to be watch is unaware that
a. Top Secret documents he is under observation
b. Confidential documents a. confidential c. loose
c. Secret Documents b. close d. discreet
d. Restricted documents
55. This method of surveillance involves following the
46. The unauthorized disclosure of this document subject from place to place to maintain a
would endanger national security, cause serious continuous watch on his activities.
injury to the interest or prestige of the nation or of a. moving c. technical
any government activity or would be of great b. stationary d. sophisticated
advantage to a foreign nation.
a. Vital/Top Secret documents 56. It is the actual and factual reporting of one’s
b. Confidential documents observation of a reported sensory experience
c. Secret Documents recounted by another.
d. Restricted documents a. reaction c. observation
b. description d. response
47. He wrote a book entitled “The Art of War”
a. Ip Man c. Sun Tzu 57. It is the systematic asking of questions to elicit
c. Genghis Khan d. Mao Tze Tung information in the minimum amount of time.
a. interrogation c. elicitation
b. investigation d. eavesdrop

58. An individual from enemy forces who is


deliberately introduced into our custody with the
specific mission of causing some unfavorable
action or reaction on our part is called
a. Provocateur c. Suspect
b. Source d. Agent
59. It is a type of surveillance according to intensity 69. Converts an enciphered message into its
and sensitivity which apply frequently or equivalent or original plain text by means of a
infrequently, period of observation varied on each cipher system.
occasion. a. Decipher c. Encode
b. Decode d. Cipher
a. Discreet c. Close
b. Loose d. Moving 70. He used letter sorting to find out the sentiments
of his men and allies.
60. It is a condition wherein the nation can a. Frederick the great c. Alexander the Great
pursue its activities necessary for the b. Genghis Khan d. Akbar
attainment of national goals without
inference from both external and internal 71. She deceived Samson into telling her the secret
threats. of his strength, which eventually led to his
a. Inter-agency coordination capture and death.
b. Intelligence Operation a. Mosses c. Sheila
c. National Security b. Delilah d. Estella
d. National Interest

61. Countries claiming the Kalayaan Island or the 72. They are informers or unreliable renegades who
Spratley Islands, like China, Taiwan, Vietnam, are chiefly used in spreading false information to
Malaysia, and Brunei, are examples of the enemy.
a. International Relation c. internal threats a. Double spies c. Common spies
b. National Security d. external threats b. Spies of consequence d. Double Agent

62. A criteria to be observed in disseminating 73. Knowledge of the enemy and the characteristics
information with urgency and must reach the user of operations used in the planning and conduct of
in sufficient time to be used. tactical operations is called-
a. Correctness c. Effortless a. Strategic Intelligence c. Combat Intelligence
b. Timeliness d. Latent b. Line Intelligence d. Strategic Intelligence

74. It is the gathering, assembling, accumulation,


63. It is the principle whereby access to classified securing, getting, amassing, and obtaining of all
matter may only be given to those persons to available information.
whom it is necessary for the fulfillment of their a. Collection c. Analysis
duties. b. Dissemination d. Integration
a. compartmentation c. need-to-know
b. cleared individuals d. security officer 75. It involves coming to a conclusion based on the
theory developed or figuring out the significance
64. It covers any form of recorded information, and impact of the information at hand.
including printed, written, drawn, or painted a. Interpretation c. Interrogation
matter, sound, recordings, photographs, films, b. Integration d. Investigation
etc.
a. classified document c. document 76. An item of intelligence or information about the
b. information d. material characteristics of the area of operations and the
enemy that the commander feels he needs
65. Jose Maria Sison is also known as- before he can reasonably arrive at a decision.
a. Rey Langit c. Armando Liwanag a. Operations Plan Report
b. Liddy Alejandro d. Carlos Forte b. Summary of Information
c. Security Survey Report
66. They are noted for being very violent and d. Essential Element of Information
engaging in terrorist activities like kidnappings,
raids on towns, ambushes, and other criminal 77. Refers to a person who for any reason submits
activities. information of intelligence interest usually on a
a. The Abbu Sayaff voluntary basis
b. The Secessionist Movement a. Agent c. Source
c. The Moro Islamic Liberation Front b. Suspect d. Subject
d. Bangsamoro Islamic Freedom Fighters
78. A person who does the questioning is called.
67. He founded the Communist Party of the a. Investigator c. Interrogee
Philippines. b. Subject d. Interrogator
a. Alex Bongcayao c. Father Balweg
b. Jose Maria Sison d. Felimon Lagman 79. It involved understanding this fact of awareness.
a. stimulus c. perception
68. It is a permanent, official, and chronological b. report d. attention
recording of events, incidents, information, and
activities being undertaken by an intelligence 80. It consists of the psychological process involved
unit. in becoming aware of the existence of a fact.
a. Intelligence File a. perception c. attention
b. Intelligence Journal b. perseverance d. senses
c. Situation Map
d. Intelligence Work Sheet
81. One of the methods of casing, wherein the 91. An interrogation technique wherein the
information is usually gained by the person interrogator is open and direct in his approach
operating in the area and performing the casing and makes no attempts to conceal the purpose of
job. the interrogator.
a. Map Reconnaissance c. research a. Egotist Techniques
b. Prior information d. hearsay b. The “Common Interest” Technique
c. Exasperation
82. A cover supporting the surveillant, who can d. The “Open Techniques”
become a convoy whenever the surveillant is
burned. 92. Which of the following does not belong to the
a. Made c. Decoy group?
b. Rabbit d. Lost a. integration c. reliability
b. pertinence d. credibility
83. It refers to a person trained to observe and
penetrate certain organizations suspected of 93. The following are covert types of police
illegal activities and later report the observation intelligence operations, except:
and information so that proper operational action a. Undercover operation c. Surreptitious Entry
can be taken. b. Surveillance d. Interrogation
a. undercover man c. rabbit
b. decoy d. cover story 94. Police:Casing- Military:________
a. Surveillance c. Roping
84. The means by which an individual group or b. Reconnaissance d. Tailing
organization conceals the true nature of its acts
or existence from the observer. 95. This phase of the cycle refers to the activities of
a. cover story c. agent transferring the processed information to the
b. undercover agent d. double spy proper users, most particularly the authority that
requires the activity.
85. Surveillance of other things, events, and activities a. Processing the Collected Information
is called b. Dissemination and Use of Information
a. roping c. reconnaissance c. Collection of information
b. shadowing d. observation d. Planning the Collection Effort

86. This was conducted by a friendly interviewee who 96. Refers to an agent who have such reached the
has information at the direction of or under the enemy, get information and would manage to get
control of the friendly intelligence service. back alive.
a. debriefing c. interrogate a. Agent of Influence c. Agent Provocateur
b. interview d. investigate b. Penetration agent d. Handler and Agent

87. It includes the use of photography, investigations, 97. It is a system of words or other symbols arbitrarily
elicitation, and interrogation, surveillance, sound used to represent words.
equipment, surreptitious entry (keys and locks), a. code c. encrypt
the use of an artist, and communication. b. cipher d. cryptoanalysis
a. Collecting Raw Information
b. Cover story 98. These are people who deliberately fed inaccurate
c. Intelligence operation information.
d. Tradecrafts a. Double agent c. Agent in Place
b. Expendable agent d. Penetration agent
88. It means that the message must be clear,
concise, and complete, as well as in the proper 99. It is biographical data through fiction that will
form, for the receiver to readily understand its portray the personality of the agent he assumed
contents. and a scenario to cover up the operation.
a. Propriety c. Reliable a. crime scene c. Wanted List
b. Timeliness d. Dependable b. cover story d. intelligence files

89. The following are the users of police intelligence, 100. Refers to any person who is subjected to the
except: interrogation process in any of its forms and
a. organized crime c. Friendly nations phases.
b. Advisor and staff d. National Leaders a. Source c. interrogee
b. Suspect d. Provocateur
90. What percent was collected from close sources?
a. 90% c. 1% oOo
b. 10% d. 99%

You might also like