Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 7

Revision Page no.

FEMFI-A-TD-AQ092 Issued Date: Oct. 07,


no.: 01 1 of 6
2013

SHIP SECURITY AWARENESS TRAINING AND


SEAFARERS WITH DESIGNATED SECURITY Approved
DUTIES by: CAS
Far East Maritime Assessment Questionnaire
Foundation Inc.
(Final – Set A)

INSTRUCTIONS: Read the questions carefully then encircle the letter that corresponds to
your answer in the appropriate column on the answer sheet. This questionnaire must be
surrendered to the Assessor/Proctor. No Erasures allowed.

Multiple choice

1. The competencies to be achieved upon completion of this course is for participants to be


able to do the following except:
a) Maintain the condition set out in the SSP
b) Undertake regular inspection of the ship
c) Fight terrorist
d) Recognize security threats and risks

2. Security threat that could damage the ship caused by nearby explosion can be classified
as:
a) Collateral damage
b) Armed robbery
c) Piracy attack
d) Terrorist attack

3. The ISPS Code implements which of the following Chapters of the SOLAS Convention?

a) V
b) IX
c) XI - I
d) XI -2

4. The person on board, accountable to the Master, designated by the company as


responsible for ship security is the:

a) CSO
b) SSO
c) PFSO
d) Captain of the ship
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 2 of 6
2013

SHIP SECURITY AWARENESS TRAINING AND


SEAFARERS WITH DESIGNATED SECURITY Approved
DUTIES by: CAS
Far East Maritime Assessment Questionnaire
Foundation Inc.
(Final – Set A)

5. The approval of the Ship Security Plan and issuance of the International Ship Security
Certificate are the responsibility of the:
a) IMO
b) RSO
c) Port State
d) Contracting Government

6. The Administration may appoint RSO to do the following except:


a) Approve SSP
b) Issue ISSC
c) Conduct PFSA
d) Set security level in ports within their territory

7. To propose modification to the ship security plan is the responsibility of:

a) SSO
b) CSO
c) PFSO
d) RSO

8. The process that identifies weaknesses in physical structure, personnel protection,


processes and other areas which may lead to breach of security refers to:

a) security assessment
b) security principles
c) security plan
d) security motives

9. The systematic and analytical process to determine the likelihood that breach of security
may endanger the security of the ship refers to:

a) onboard survey
b) risk – based decision making
c) security inspection
d) security audit
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 3 of 6
2013

SHIP SECURITY AWARENESS TRAINING AND


SEAFARERS WITH DESIGNATED SECURITY Approved
DUTIES by: CAS
Far East Maritime Assessment Questionnaire
Foundation Inc.
(Final – Set A)

10. The data to be considered in conducting actual on board survey should include the
following except:

a) documentation:
b) embarkation of persons and baggage
c) harbor pilot
d) cargo and ship store handling

11. The equipment that transmits information about your ship’s name, call sign, course,
speed etc and at the same time receive similar data from other ships:

a) EPIRB
b) AIS
c) NAVTEX
d) SSAS

12. This device can detect a package of drugs inside a large delivery of ship store. What is
it?
a) vapor detector
b) pallet scanner
c) anti – intruder device
d) metal detector

13. The thumb rule in operating new equipment is to:


a) unplug the equipment
b) determine the price of the equipment
c) read the manual
d) seek the help of an expert

14. In conducting search divided into heights for multiple sweep, second sweep should
cover:
a) from the waist to shoulder heights
b) from the floor to the waist
c) from the shoulder height to the ceiling
d) from the floor to the ceiling
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 4 of 6
2013

SHIP SECURITY AWARENESS TRAINING AND


SEAFARERS WITH DESIGNATED SECURITY Approved
DUTIES by: CAS
Far East Maritime Assessment Questionnaire
Foundation Inc.
(Final – Set A)

15. The type of search done in covert technique to avoid panic is called:
a) nominated officer search
b) external team search
c) crew search
d) reactive search

16. Which of the following explosive device is commonly used against airplanes since it is
set to explode upon change of altitude:
a) pressure bomb
b) time bomb
c) barometric bomb
d) sex bomb

17. During bomb search, which of the following is an important principle to follow?
a) try to reach behind the bulkhead to locate bomb
b) know exactly the type of bomb discovered
c) throw any suspicious items overboard immediately
d) do not touch any suspicious item or package

18. Which of the following is not considered one of the components of an IED?
a) timer/switch
b) power source
c) magnetic cord
d) detonator

19. When searching for bomb, what is the general rule to follow?
a) use the crew of the same department
b) use the crew of the different department
c) use the security guards
d) use the personnel from the fire department
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 5 of 6
2013

SHIP SECURITY AWARENESS TRAINING AND


SEAFARERS WITH DESIGNATED SECURITY Approved
DUTIES by: CAS
Far East Maritime Assessment Questionnaire
Foundation Inc.
(Final – Set A)

20. The type of physical search which involves touching the body to find out if the person is
concealing weapon or contraband item inside his clothing refers to:
a) body frisking
b) 100% body search
c) use of metal detector
d) use of X-ray machine

21. If suspicious object is found, search team should apply the 5 C’s which includes: confirm,
clear, check, contact and:
a) cheer
b) cordon
c) cover
d) chant

22. The persons responsible for establishing search procedures on board ships are:
a) master and SSO
b) master and CSO
c) master and PFSO
d) CSO and SSO

23. The method used to get beneath the outer shell of an individual to obtain a more
complete picture refers to:
a) photography
b) behavioral profiling
c) body frisking
d) 100% body search

24. In giving instructions to a crowd during crisis, the following factors affect information
reception except:
a) sender credibility
b) amount of money involved
c) immediate social situation
d) location
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 6 of 6
2013

SHIP SECURITY AWARENESS TRAINING AND


SEAFARERS WITH DESIGNATED SECURITY Approved
DUTIES by: CAS
Far East Maritime Assessment Questionnaire
Foundation Inc.
(Final – Set A)

25. Ships entering the port of another Contracting Government shall provide the following
except:
a) valid ISSC
b) details of SSP
c) security level the ship is operating
d) security measures adopted in previous ports

26. The agreement reached between a ship and a port facility or ship with another ship on
the security measures they will implement refers to:
a) security agreement
b) declaration of security
c) ship/port interface
d) security plan

27. The security level on which further security measures should be applied due to imminent
risk that security incident might occur refers to:
a) level – 1
b) level – 2
c) level – 3
d) all levels

28. The plan which contains lists of action to be undertaken should an event happened
refers to:
a) contingency plan
b) ship safety plan
c) emergency plan
d) emergency preparedness

29. Drills must be conducted at least once in:


a) 3 months
b) 4 months
c) 5 months
Revision Page no.
FEMFI-A-TD-AQ092 Issued Date: Oct. 07,
no.: 01 7 of 6
2013

SHIP SECURITY AWARENESS TRAINING AND


SEAFARERS WITH DESIGNATED SECURITY Approved
DUTIES by: CAS
Far East Maritime Assessment Questionnaire
Foundation Inc.
(Final – Set A)

d) 2 months

30. Records shall be kept in the working language of the ship and translated to English,
Spanish or which of the following if the working language is not English?
a) French
b) German
c) Russian
d) Latin

You might also like