Professional Documents
Culture Documents
SDSD Assessment Questionnaire-Set A.1
SDSD Assessment Questionnaire-Set A.1
INSTRUCTIONS: Read the questions carefully then encircle the letter that corresponds to
your answer in the appropriate column on the answer sheet. This questionnaire must be
surrendered to the Assessor/Proctor. No Erasures allowed.
Multiple choice
2. Security threat that could damage the ship caused by nearby explosion can be classified
as:
a) Collateral damage
b) Armed robbery
c) Piracy attack
d) Terrorist attack
3. The ISPS Code implements which of the following Chapters of the SOLAS Convention?
a) V
b) IX
c) XI - I
d) XI -2
a) CSO
b) SSO
c) PFSO
d) Captain of the ship
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 2 of 6
2013
5. The approval of the Ship Security Plan and issuance of the International Ship Security
Certificate are the responsibility of the:
a) IMO
b) RSO
c) Port State
d) Contracting Government
a) SSO
b) CSO
c) PFSO
d) RSO
a) security assessment
b) security principles
c) security plan
d) security motives
9. The systematic and analytical process to determine the likelihood that breach of security
may endanger the security of the ship refers to:
a) onboard survey
b) risk – based decision making
c) security inspection
d) security audit
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 3 of 6
2013
10. The data to be considered in conducting actual on board survey should include the
following except:
a) documentation:
b) embarkation of persons and baggage
c) harbor pilot
d) cargo and ship store handling
11. The equipment that transmits information about your ship’s name, call sign, course,
speed etc and at the same time receive similar data from other ships:
a) EPIRB
b) AIS
c) NAVTEX
d) SSAS
12. This device can detect a package of drugs inside a large delivery of ship store. What is
it?
a) vapor detector
b) pallet scanner
c) anti – intruder device
d) metal detector
14. In conducting search divided into heights for multiple sweep, second sweep should
cover:
a) from the waist to shoulder heights
b) from the floor to the waist
c) from the shoulder height to the ceiling
d) from the floor to the ceiling
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 4 of 6
2013
15. The type of search done in covert technique to avoid panic is called:
a) nominated officer search
b) external team search
c) crew search
d) reactive search
16. Which of the following explosive device is commonly used against airplanes since it is
set to explode upon change of altitude:
a) pressure bomb
b) time bomb
c) barometric bomb
d) sex bomb
17. During bomb search, which of the following is an important principle to follow?
a) try to reach behind the bulkhead to locate bomb
b) know exactly the type of bomb discovered
c) throw any suspicious items overboard immediately
d) do not touch any suspicious item or package
18. Which of the following is not considered one of the components of an IED?
a) timer/switch
b) power source
c) magnetic cord
d) detonator
19. When searching for bomb, what is the general rule to follow?
a) use the crew of the same department
b) use the crew of the different department
c) use the security guards
d) use the personnel from the fire department
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 5 of 6
2013
20. The type of physical search which involves touching the body to find out if the person is
concealing weapon or contraband item inside his clothing refers to:
a) body frisking
b) 100% body search
c) use of metal detector
d) use of X-ray machine
21. If suspicious object is found, search team should apply the 5 C’s which includes: confirm,
clear, check, contact and:
a) cheer
b) cordon
c) cover
d) chant
22. The persons responsible for establishing search procedures on board ships are:
a) master and SSO
b) master and CSO
c) master and PFSO
d) CSO and SSO
23. The method used to get beneath the outer shell of an individual to obtain a more
complete picture refers to:
a) photography
b) behavioral profiling
c) body frisking
d) 100% body search
24. In giving instructions to a crowd during crisis, the following factors affect information
reception except:
a) sender credibility
b) amount of money involved
c) immediate social situation
d) location
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 6 of 6
2013
25. Ships entering the port of another Contracting Government shall provide the following
except:
a) valid ISSC
b) details of SSP
c) security level the ship is operating
d) security measures adopted in previous ports
26. The agreement reached between a ship and a port facility or ship with another ship on
the security measures they will implement refers to:
a) security agreement
b) declaration of security
c) ship/port interface
d) security plan
27. The security level on which further security measures should be applied due to imminent
risk that security incident might occur refers to:
a) level – 1
b) level – 2
c) level – 3
d) all levels
28. The plan which contains lists of action to be undertaken should an event happened
refers to:
a) contingency plan
b) ship safety plan
c) emergency plan
d) emergency preparedness
d) 2 months
30. Records shall be kept in the working language of the ship and translated to English,
Spanish or which of the following if the working language is not English?
a) French
b) German
c) Russian
d) Latin