Fs 1 FINAL

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 15

REPUBLIC OF THE PHILIPPINES

J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS


Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
Bachelor of Science in Criminology
INDUSTRIAL SECURITY MANAGEMENT
FINAL EXAMINATION
Name: ______________________________________ Course & Yr.:______________________
Section/Schedule: _____________________________ Date: ____________________________
Instruction: Read carefully every item and supply your answer on the space provided. Note:”
No ERASURES” Please be guided accordingly.

Test 1: Multiple Choice: Read and analyze every item carefully and encircle the letter of your
choice.
1. A logical set of tangible elements and measures adopted to prevent unauthorized access
to equipment, facilities, materials, documents and personnel.
a. document security c. physical security
b. personnel security d. information security
2. It refers to protection from hostile forces, against possible harm or danger caused by
others.
a. risk c. safety
b. threat d. security
3. A type of security applied to business groups engaged in manufacturing, research and
development.
a. hotel security c. physical security
b. industrial security d. corporate security
4. One of the major areas of security concern with the procedure to be followed , inquiries
conducted and criteria applied to determine the work suitability of a particular applicant
or the retention of the particular employee in the business installations.
a. Physical Security c. document s3ecurity
b. Personnel Security d. industrial security
5. A record , reproduction of which will involve considerable expense and labor or
considerable delay.
a. vital document c. important document
b. useful document d. non essential document
6. A type of security applied for the protection of top-ranking officials of the government or
private entity, visiting persons of illustrious standing and foreign dignitaries.
a. international security c. Political Security
b. VIP Security d. national security
7. An indication of impending danger or harm, a positive inimical act.
a. hazard c. Vulnerability
b. risk d. threat
8. The state of being exposed to the possibility of being attacked or harmed. the inability to
withstand the effects of a hostile environment.
a. treat c. vulnerability
b. risk d. hazard
9. A situation involving exposure to danger. A probability of an event to happen that will
lead to loss.
a. threat c. vulnerability
b. risk d. hazard
10. It is Something that can potentially cause harm: passive inimical acts.
a. threat c. vulnerability
b. risk d. hazard
11. Any structure or physical device capable of restricting, deterring, delaying, illegal access
to an installation.
a. Physical Barrier c. natural Barrier
b. Personnel Barrier d. man made barrier
12. An act or condition in a situation conducive to a breach of protection system and the
subsequent loss or compromise, or damage to personnel,, property or facilities.
a. man-made hazard c. safety hazard
b. security hazard d. natural hazard
13. A structure which defines the physical limits of an installation or area and also restrict or
deny access thereto.
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
a. Barrier c. installation
b. Fence d. deterrence
14. The overhang of barbed wire along the top portion of the fence, facing outward and
upward at approximately 45-degree angle.
a. barbed wire fence c. top guard
b. concertina fence d. chain link fence
15. It is manually operated and is usually made up of movable search or floodlights that can
be locate in selected or special locations which will require lightning only for a short
period of time.
a. standby lightning c. movable lightning
b. stationary lightning d. all of the above
16. One of the most important barrier in security usually defined to alert the security
personnel to a consummated or attempted intrusion into an area, building or compound.
a. protective lightning c. alarm control
b. protective alarm d. lightning control
17. Information that in some way relates to the status or operations of the possessor and over
which the possessor asserts ownership.
a. secondary information c. detachable information
b. important information d. proprietary information
18. It is the maintenance of all the essential documents stored, filed, backed uo, processed,
delivered, and eventually disposed of when no longer needed.
a. compartmentation c. document security
b. disqualification d. information security
19. An unauthorized disclosure of this information could cause serious damage to the
country’s national security.
a. top secret information c. confidential information
b. secret information d. all of the above
20. Information considered of a personal nature and is intended for company use only, its
disclosure may affect the reputation of the company.
a. public information c. sensitive information
b. secret information d. private information
21. An inquiry into the repuration, integrity, character, morals, and loyalty of an individual to
determines persons suitability for appointment or access to classified matters.
a. national agency check c. personal security investigation
b. background check d. loyalty check.
22. it srves as a trigger apparatus for protective alarms.
a. circuit c. signaling device
b. sensor d. alarm device
23. It is the susceptibility of a plant or establishments to damage, loss or disruption of
operations due to various hazards.
a. relative criticality c. risk assessment
b. relative vulnerability d. risk analysis
24. The private security agency law is known as?
a. R.A 5487 C. R.A 5467
b. R.A 5476 D. 5478
25. A branch of information security applied to both theoretical and actual computer system.
A. Computing security B. Computer security C. Data security D. Information security
26. A fact-finding probe to determine a plant adequacy and deficiency in all aspects of
security.
A. security awareness program B. security guidance
C. security education D. security survey
27. Among the classification of documents which do you think is the least priority?
A. Secret B. Top secret C. Restricted D. Confidential
28. Among the visitors movement control, which of the following is the most important?
A. Visitor’s logbook B. Escort C. Visitors entrance D. Time traveled
29. An industrial complex must established its first line of physical defense. It
must have;
A. the building itself B. communication barrier
C. perimeter barriers D. window barriers
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION

Are physical barriers


30.

constructed by men that


tend to the
intruder.
A. Animal Barriers B. Energy
Barriers
C. Human Barriers D. Structural
Barriers
7. Canine unit is an example of
what type of barrier?
A. Structural Barriers B. Human
Barriers
C. Animal Barrier D. Energy
Barrier
8. Change key, Sub master key,
master key, grand master key.
Which group
should they belong?
A. Key control B. Keying
system
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION

C. Types of key locks D. Types


of locking devices
9. In SWOT analysis, “W”
means:
A. Vulnerabilities B.
Threats
C. Intelligence D. Win
30. Are physical barriers constructed by men that tend to delay the intruder.
A. Animal Barriers B. Energy Barriers C. Human Barriers D. Structural Barriers

31. Canine unit is an example of what type of barrier?


A. Structural Barriers B. Human Barriers C. Animal Barrier D. Energy Barrier
32. Change key, Sub master key, master key, grand master key. Which group should they
belong? A. Key control B. Keying system C. Types of key locks D. Types of locking
devices
33. In SWOT analysis, “W” means:
A. Vulnerabilities B. Threats C. Intelligence D. Win
34. PBI stands for…
A. Partial Background Investigator B. Partial Background Investigation
C. Philippine Background Investigator D. Philippine Background Investigation
35. The following are Political Field of security except one:
A. International Security B. National Security
C. Human Security D. Financial Security
36. The part of security measure which informs at once the authority about intrusion in an
establishment.
A. Alarm B. speed information C. signal D. tactical notice
37. They are also referred to as the BLUE ARMY.
A. SAF B. Government Security Guard
C. Private Security Guard D. Philippine Army
38. This system consists of ringing up a visual or audible alarm near the object to be protected.
A. Central Station System B. Proprietary system
C. Local Alarm D. Auxiliary Alarm
39. A type of lock which is portable and detachable lock having a sliding hasp which passes
through a staple ring and is then made fasten or secured.
A. Card-operated lock B. Pad lock C. Combination Lock D. Electrical Lock
40. A security that concerns about unauthorized access to equipment ,building,
facilities, materials, documents, and to safeguard them against espionage, sabotage, damage, loss
and theft. A document security B. personnel security
C. communications security D. physical security
41. A breach of the protective system and the subsequent loss or compromise of defense
information, company secrets or damage to personnel, property or personnel.
A. hazard B. security barrier C. sabotage D. security risk
42. A type of security applied to business groups engaged in industries like manufacturing,
assembling, research and development, processing, warehousing and even agriculture.
A. Industrial security B. Hotel security C. VIP security D. Bank security
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
43. This includes any person who offers or renders personal services to watch or secure
either a residence or business establishment or both or buildings, compounds or areas,
for hire or compensation or as employee thereof.
A. Blue Army B. Personal Body Guard C. Security Guard D. Guard for Hire
44. This refers to any person who offers or renders personal service towatch or secure either
residence or business establishment or both for hire or compensation and with a license to
exercise profession.
A. Private security agency B. Company security force
C. Security guard D. Government security unit
45. This is an additional outward inclined fixed structure usually barbed wires placed above a
vertical fence to increase physical protection from intruders of a certain area, this is known as
A. Cellar Guard B. Tower Guard C. Top Guard D. Top Tower
46. Nicy is planning to build his house in one of the nicest subdivision in their town of Tagaytay
City; he plans to have many forms of security so that no one has an access to his property. If
Nicy going to include the quality of the building exterior of his dream house this is considered
as?
A. First line of defense B. third line of defense
C. Second line of defense D. All of these
47. Reggie is applying for the position of Regional Director of the company he is very much
qualified for the vacant position. One of the procedures of the company to determine the loyalty
of their employees that is to ensure that the firm hires those best suited to assist the firm in
achieving goals and objectives.
A. Physical security B. human security C. Personnel security D. none of these
48. Diamond Hotel is one of the popular and abundant hotel in Luzon City,one of the barriers
used in that hotel are the guard forces to protect theassets of the hotel at the same time the guest.
Protection given by thehotel is considered as;
A. Human security B. Human barriers C. Hotel security D. Personnel Security
49. Matty has an inmate friend named Vicky, she was convicted of qualified theft that made her
to serve 6 years and 1 day inside jail. Matty doesn’t want to experience the life of her friend
behind bars that made him a good person in the community. The statement is referring to:
A. Active measures B. Aware of security C. Passive measures D. all of these
50. President Pinoy is planning to visit Davao City regarding the problem on judicial killings.
Personnel from PNP, AFP and other government agency are preparing for the security to
be given to the president. What type of security to be administered to the president?
A. Personnel security B. Personal security C. Crises Security D. Operational Security
51. Gene Cruz is appointed as the General Manager of the organization because of
his excellent performance in exercising control and supervision on some functions of the
organization. The statement is best referred as:
A. Industry B. Industrial C. Management D. Security
52. Bart is constructing his house with assured quality of barbed wires for the fences of the gate,
wood for the windows and doors and grills so that unauthorized access may not possible to
happen;
A. Security education B. Safe barriers
C. Physical security D. Quality materials
53. It surmounted by the barbed wire top guards, and if the height is less than the prescribed,
additional topping is placed to attain the minimum height requirement.
A. clear zone B. bodies of water C. building wall D. wire fence
54. One who steals with pre-conceived plans and takes away any of all types of items or supplies
for economic gain.
A. pilferer B. casual pilferer C. systematic pilferer D. intruder
55. How is one classified if he steals primarily because of irresistible urge due to unexpected
opportunity?
A. casual pilferer B. ordinary pilferer C. systematic D. unusual pilferer
56. The protection resulting from the application of various measures which prevent or delay
the enemy or unauthorized person in giving information through the communication
system.
A. Communication security B. Hotel security
C. Industrial safety D. Physical security
57. The protection resulting from the application of various measures which safeguard hotel
guests and their personal effects, hotel properties and functions in hotel restaurant, bars
and club.
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
A. Communication security B. Hotel security
C. Industrial safety D. Physical security
58. The security involving the protection of documents and classified papers from loss,
assessed by the unauthorized persons damage, theft and compromise through disclosures.
A. Communication security B. Document security
C. Hotel security D. Physical security
59. They shall ___________ an adequate library of books, magazines and other publications on
security subject. ;
a.Control b.Serve c.Structure d.Establish
60. They shall at all times exercise ___________ and be prepared to prevent the use of their
guards or the agency;
a.Diligence b.Vigilance c.Respect d.Integrity
61. They shall always be truthful and ____________ in reports;.
a.Standard b.Accurate c.Narrative d.Direct
62. To _____ all calls from post more distant from the security house where I am stationed;
a.Quit b.Report c.Repeat d.sound
63. To _____ all violations of order I am instructed to enforce;
a.Quit b.Report c.Repeat d.sound
64. To _____ my post only when properly relieved;
a.Quit b.Report c.Repeat d.sound
65. To _____ or call the alarm in case of fire or disorder;
a.Quit b.Report c.Repeat d.Sound
66. To _____ to no one except in the line of duty;
a.Walk b.Talk c.Receive d.Salute
67. To _____ , obey and pass on to the relieving guard all order form company officers;
a.Walk b.Talk c.Receive d.Salute

68. To _____ in an alert manner during my tour of duty and observing everything that takes
place within sight or hearing;
a.Walk b.Talk c.Receive d.Salute
69. To _____ all company officials superiors in the agency, ranking public officials, and
commission officer of the AFP;
a.Walk b.Talk c.Receive d.Salute
70. To _____ charge of the post and all companies properties in view and protect the same with
utmost diligence;
a.Walk b.Take c.Receive d.Salute
71. A special key capable of opening a series of locks;
a.Master key b.Sub master key c.Original key d.Grand master key
72. A key to a single lock within a master keyed system;
a.Master key b.Sub master key c.Change key d.Grand master key
73. It is the devices holding a door closed by magnetism;
a.Code lock b.Combination Lock c.Lever lock d.Electromagnetic lock.
74. This not the purpose of security survey;
a.determine existing state of security b.locate criminals
c.Produce recommendations establishing a total security program
d.determine the conclusion and probabilities
75. Planning the security survey except for one;
a.Obtain organizational support b.Verify the need
c.Develop alternatives d.Implement the managers policy
76. All of this is types of security inspection except for one;
a.Formal b.Structured c. Continuous d. Valuable
77. Results of a long and firmly entrenched inspection program understood by all and accepted;
a. Formal b.Structured c. Continuous d. Informal
78. One security inspections that moves systemically.;
a.Formal b.Structured c. Continuous d. Informal
79. It is the work of a manager performs to assess and regulate work in progress and to assess
the results;
a.Planning b.Organizing c. Controlling d. Leading
80. Roadblocks are what type of physical barrier? ;
a.Energy b.Structural c.Human d.Animal
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
81. Electronic device are what type of physical barrier?
a.Energy b.Structural c.Human d.Animal
82. Canyons are what type of physical barrier? ;
a.Natural b.Structural c.Human d.Animal
83. Walls are what type of physical barrier? ;
a.Natural b.Structural c.Human d.Animal
84. Barbed Tape is composed of 3 things except for one ;
a.Barbed tape b.Barbed Dispenser c.Barbed Concertina d.Barbed wire
85. Any person who does detective work for hire, reward or commission;
a.Intelligence Officer b.Detective Officer
c.Secret Agent d.Private Detective
86 . A key that will open all the lock within a particular area or grouping in a given facility;
a.Master key b.Sub master key c.Original key d.Grand master key
87. It is the process of conducting physical examination to determine compliance with establishment
security policies and procedures;
a.Security Survey b.Security Inspection
c. Security education d. Security Protection
88. It is given to employees of an installation by lecture and other means pertaining to measures and
safeguards to be taken to protect ;
a.Security information b.Security awareness
c. Security education d. Security Preparation
89. Security Guards Creed – As a security guard my __________ duty;
a.Basic b.Honorable c.Fundamental d. Sacred Protection

90. . Security guard duty is to serve the interest and mission of his ________;
a.Manager b.Client c.Consultant d.Agency Protection
91. Shall carry with him at all times during his tour of duty his license ID ;
a.Ethical Standard b.Code of Conduct c.General order d.Operators Creed
92. Security Consultant qualifications; choose which one is not belong;
a.Filipino and Alien Citizen
b.Physically Fit
c.Holder of a Master’s Degree, MNSA or Industrial Security Management
d.At least 10 years experience in the field of security.
93. Shall not read newspaper, magazines, books while actually performing his duties;
a.Ethical Standard b.Code of Conduct c.General order d.Operators Creed
94. Shall not compromise with criminals and other lawless elements to the prejudice of the
customers;
a.Ethical Standard b.Code of Conduct c.General order d.Operators Creed
95. Security force maintained and operates by any private company utilizing any of its employees to
watch, secure or guard;
a.Security guard b.Company guard force c.Government guard unit d.Private guard
96. Shall talk to no one except in the line of duty;
a.Ethical Standard b.Code of Conduct c.General order d.Operators Creed
97. It is the protection resulting from the application of various measures which safeguards cash and
assets which in storage, in transit and during transaction.;
a.Bank Security b.Hotel Security c.Corporate Security d.Communication Security
98. It is resulting from the protection of processes, formulas, patents and industrial and
manufacturing activities from espionage ;
a.Document Security b.Operational Security c.Corporate Security d.Communication Security
99. It is resulting from the protection of application of various measures which prevent or delay the
enemy or unauthorized person in gaining information;
a.Document Security b.Operational Security c.Corporate Security d.Communication Security
100. It is resulting from the protection classified papers and vital records from loss, access to
unauthorized persons, damage , theft and etc, ;
a.Document Security b.Operational Security c.Corporate Security d.Communication Security
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
101. The providing of sufficient illumination to areas during hours of darkness to insure visibility
and to act as a deterrent to the intruders;
a.Security Alarm system b.Security Lighting
c.Security Surveillance d.Security Flash light
102. It is resulting from the protection top ranking officials of the government or visiting persons of
illustrious standing;
a.Document Security b.Operational Security c.Corporate Security d.VIP Security
103. It is the sum total of all physical safeguards employed or installed to secure the assets;
a.Physical Security b.Document Security c.Personnel Security d.Internal Security
104. What line of defense is grills? ;
a.1st line of defense b. 2nd line of defense c. 3rd line of defense d.Barrier Line
105. What line of defense is cabinets? ;
a.1st line of defense b. 2nd line of defense c. 3rd line of defense d.Barrier Line
106. What line of defense is guard? ;
a.1st line of defense b. 2nd line of defense c. 3rd line of defense d.Barrier Line
107. What line of defense is doors? ;
a.1st line of defense b. 2nd line of defense c. 3rd line of defense d.Barrier Line
108. What line of defense is gate? ;
a.1st line of defense b. 2nd line of defense c. 3rd line of defense d.Barrier Line
109. What line of defense is vaults? ;
a.1st line of defense b. 2nd line of defense c. 3rd line of defense d.Barrier Line
110. . Any structure or physical device capable of restricting, deterring, delaying illegal access:
a.Physcial Barrier b.Perimeter barrier c.Barrier d.Protective Barrier
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION

REMOVAL EXAM\\
Name: ______________________________________ Course & Yr.:______________________
Section/Schedule: _____________________________ Date: ____________________________
Instruction: Read every item carefully and supply your answer on the space provided.

TEST 1. IDENTIFICATION
_____________1. It is an act or condition which results in a situation conducive to a breach of
the protection system and the subsequent loss or compromise to property or facilities.
_____________2. The unauthorized disclosure of this type of information could cause some
damage to the country’s national security.
_____________3It is an administrative determination that an individual is eligible from a
security standpoint to access classified matters of a specific category.
____________4. The action of tearing or cutting something into shreds.
____________5. A very dangerous adversary and his skills in deception and his cunning should
never be underestimated.
____________6. A thief who still without using violence.
____________7. It involves the destruction of an employers property, tools, equipment or
products which can ultimately affects a company’s profit.\
____________8. Refers to an individual whose personal information is processed.
____________9. One who steals due to his inability to resist the unexpected opportunity and has
a little fear of detection, usually a loner on the job.
____________10. It is Legally called theft, this activity when controlled may results to
company’s financial drain.
____________11. An act of obtaining the personal information of another person to use their
identity to commit fraud, unauthorized transactions or purchases.
____________12. It is a term given to the requirement that the dissemination of classified
matters be limited strictly to those persons whose official duties requires knowledge.
____________13. Information that is personally associated with a specific individual or is
addressed by a privacy law then it may need to be classified.
____________14. It is a type of Security Clearance that is effective for only 2 years.
____________15. The practice of spying or using spies to obtain information about plans and
activities especially of a foreign government or a competing company.
TEST 2. MULTIPLE CHOICE. Encircle only the correct answer.
1. A type of security applied for the protection of top-ranking officials of the government or
private entity, visiting persons of illustrious standing and foreign dignitaries.
c. international security c. Political Security
d. VIP Security d. national security
2. An indication of impending danger or harm, a positive inimical act.
c. hazard c. Vulnerability
d. risk d. threat
3. The state of being exposed to the possibility of being attacked or harmed. the inability to
withstand the effects of a hostile environment.
c. treat c. vulnerability
d. risk d. hazard
4. A situation involving exposure to danger. A probability of an event to happen that will
lead to loss.
c. threat c. vulnerability
d. risk d. hazard
5. It is Something that can potentially cause harm: passive inimical acts.
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
c. threat c. vulnerability
d. risk d. hazard
6. Any structure or physical device capable of restricting, deterring, delaying, illegal access
to an installation.
c. Physical Barrier c. natural Barrier
d. Personnel Barrier d. man made barrier
7. An act or condition in a situation conducive to a breach of protection system and the
subsequent loss or compromise, or damage to personnel,, property or facilities.
c. man-made hazard c. safety hazard
d. security hazard d. natural hazard

8. A structure which defines the physical limits of an installation or area and also restrict or
deny access thereto.
c. Barrier c. installation
d. Fence d. deterrence
9. The overhang of barbed wire along the top portion of the fence, facing outward and
upward at approximately 45-degree angle.
c. barbed wire fence c. top guard
d. concertina fence d. chain link fence
10. It is manually operated and is usually made up of movable search or floodlights that can
be locate in selected or special locations which will require lightning only for a short
period of time.
c. standby lightning c. movable lightning
d. stationary lightning d. all of the above
11. One of the most important barrier in security usually defined to alert the security
personnel to a consummated or attempted intrusion into an area, building or compound.
c. protective lightning c. alarm control
d. protective alarm d. lightning control
12. Information that in some way relates to the status or operations of the possessor and over
which the possessor asserts ownership.
c. secondary information c. detachable information
d. important information d. proprietary information
13. It is the maintenance of all the essential documents stored, filed, backed uo, processed,
delivered, and eventually disposed of when no longer needed.
c. compartmentation c. document security
d. disqualification d. information security
14. An unauthorized disclosure of this information could cause serious damage to the
country’s national security.
c. top secret information c. confidential information
d. secret information d. all of the above
15. Information considered of a personal nature and is intended for company use only, its
disclosure may affect the reputation of the company.
c. public information c. sensitive information
d. secret information d. private information

TEST 3. ENUMERATION. Utilize the vacant space of your paper.


16-17. What are the 2 Schemes of Information Classification?
18. 20. What are the 3 Criteria of Information Classification?
21. 24. Types of Proprietary Information.
25. 27. What are the 3 unique attributes of information?
28.31. What are the 4 Types of Document?
32-38. Enumerate the Different Characteristics of Information.
39-42. What are the Classifications of Documents?
43. 44. What are the 2 types of Pilferer?
45-46. What are the 2 types of Security Clearances?
47-50. What are the 4 types of Proprietary Information?
51. Enumerate the Different types of Fences.

TEST 4. ESSAY.
1. Explain What is Security Survey?
2. What is the Difference Between Top Secret Information To Confidential Information?
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
3. Explain the Importance of Fences
4. Explain What is Industrial Security Management/
5. What is the importance of Security to us as a Human? explain.
6. What Security Measures we have to apply to avoid crisis to happened?

INSTRUCTION: Select the correct answer for each of the following questions. Mark only one answer for
each item by shading the space corresponding to the letter of your choice on the answer sheet
provided. STRICTLY NO ERASURES ALLOWED.
1. Ethical Standard: Constantly endeavour to raise quality __________ of private
security services ; a.Authority b.Services c.Function d.Standard
2. Endeavour to fulfill their ____________ duties in accordance with the highest moral
principles ; a.Private b.Public c.Professional d.Standard
3. Contribute to the ______________ welfare by securing and preserving industrial
facilities of the country ; a.Private b.Public c.National d.Filipino
4. Constantly work with and assist the law enforcement agencies in the ___________ of
peace and order in the country; a.Reservation b.Communication
c.Preservation d.Cooperation
5. With faith and diligence , perform their __________ obligations for the protection of
life, limb and property; a.Civil b.Private c.Public d.Contractual
6. Code of Conduct: They shall all times adhere to professional ________ and refrain
from practices that negate the best interest; a.Authority
b.Services c.Ethics d.Standard
7. They shall not indulge in _____________ competition by undercutting the existing
contract rates.; a.Asset b.Financial c.Cut throat d.Private
8. They shall not _________ means or misrepresentations in all their business
transactions; a.Quarrel b.Deceitful c.Clandestine d.Practical
9. They shall ___________ an adequate library of books, magazines and other
publications on security subject. ; a.Control b.Serve c.Structure d.Establish
10. They shall at all times exercise ___________ and be prepared to prevent the use of
their guards or the agency; a.Diligence b.Vigilance c.Respect d.Integrity
11. They shall always be truthful and ____________ in reports;
a.Standard b.Accurate c.Narrative d.Direct
12. To _____ all calls from post more distant from the security house where I am
stationed; a.Quit b.Report c.Repeat d.sound
13. To _____ all violations of order I am instructed to enforce; a.Quit b.Report c.Repeat
d.sound
14. To _____ my post only when properly relieved; a.Quit b.Report c.Repeat d.sound
15. To _____ or call the alarm in case of fire or disorder; a.Quit b.Report
c.Repeat d.Sound
16. To _____ to no one except in the line of duty; a.Walk b.Talk c.Receive d.Salute
17. To _____ , obey and pass on to the relieving guard all order form company officers;
a.Walk b.Talk c.Receive d.Salute
18. To _____ in an alert manner during my tour of duty and observing everything that
takes place within sight or hearing; a.Walk b.Talk c.Receive d.Salute
19. To _____ all company officials superiors in the agency, ranking public officials, and
commission officer of the AFP; a.Walk b.Talk c.Receive d.Salute
20. To _____ charge of the post and all companies properties in view and protect the
same with utmost diligence; a.Walk b.Take c.Receive d.Salute
21. A special key capable of opening a series of locks; a.Master key b.Sub master key
c.Original key d.Grand master key
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
22. A key to a single lock within a master keyed system; a.Master key b.Sub master
key c.Change key d.Grand master key
23. It is the devices holding a door closed by magnetism; a.Code lock b.Combination Lock
c.Lever lock d.Electromagnetic lock.
24. This not the purpose of security survey; a.determine existing state of
security b.locate criminals c.Produce recommendations establishing a total security
program d.determine the conclusion and probabilities
25. Planning the security survey except for one; a.Obtain organizational support b.Verify
the need c.Develop alternatives d.Implement the managers policy
26. All of this is types of security inspection except for one; a.Formal b.Structured c.
Continuous d. Valuable
27. Results of a long and firmly entrenched inspection program understood by all and
accepted; a.Formal b.Structured c. Continuous d. Informal
28. One security inspections that moves systemically.; a.Formal b.Structured c.
Continuous d. Informal
29. It is the work of a manager performs to assess and regulate work in progress and to
assess the results; a.Planning b.Organizing c. Controlling d. Leading
30. It is the work of a manager performs to effect active participation from his
subordinates ; a.Planning b.Organizing c. Controlling d. Leading
31. A system use in big installation whereby keys can open groups of locks; a.Key
master b.Master Keying System c.Master Lock d.Key System
32. Example of terrorism; a.Riot b.Unfair competition c.Tornado d.Assassination
33. Physical Environment Probability Factors; a.Age Groups b.Composition c.Planning
d.Social History
34. Specifications regarding the use of Chain Link fences; a.Be constructed of 6 foot b.
Be constructed of 7 foot c. Be constructed of 8 foot d. Be constructed of 9 foot
35. Types of perimeter barrier which is not belong; a.Wire Fences b.Vault c.Bodies of
water d.Buliding walls
36. Inter relationship of Security personnel to PNP; a.Security personnel always
subordinate to the members of PNP b.All evidence gathered in the said investigation
should be turnover to the PNP unit concerned c.All violations in the said company
enforcing by the security personnel should be reported to the PNP d.Harmonious
relationship for curtailing law less elements.
37. Storms is a sample of _______ hazards; a.Natural b.Man made c.Mechanical
d.Physical
38. This probabilty ratings has Insufficient data are available for an evaluation ;
a.Virtually Certain b.Highly Probable c.Moderately Probable d.Probability Unknown
39. Grounds for cancellation of Security Agency License; which one is not belong; a.When
the agency submits a falsified license to prospective client for bidding b.When the
agency practice “KABIT SYSTEM” c.When the agency fail to employ a minimum of 200
gainfully employed security guards d.When the agency coordinate with the law
enforcement agency.
40. Any person who does detective work for hire, reward or commission; a.Private
Benjamin b.Intelligence officer c.Private Detective d.Private Intel
41. Stated in the Security Guard Creed which is not belong; a.Maka Dios b.Maka Bayan
c.Makata d.Makatao
42. Hardware is what type of physical barrier? ; a.Energy b.Structural c.Human d.Animal
43. Geese are what type of physical barrier? ; a.Energy b.Structural c.Human d.Animal
44. Roadblocks are what type of physical barrier? ; a.Energy b.Structural
c.Human d.Animal
45. Electronic device are what type of physical barrier? ; a.Energy b.Structural c.Human
d.Animal
46. Canyons are what type of physical barrier? ; a.Natural b.Structural c.Human d.Animal
47. Walls are what type of physical barrier? ; a.Natural b.Structural c.Human d.Animal
48. Barbed Tape is composed of 3 things except for one ; a.Barbed tape b.Barbed
Dispenser c.Barbed Concertina d.Barbed wire
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
49. Any person who does detective work for hire, reward or commission; a.Intelligence
Officer b.Detective Officer c.Secret Agent d.Private Detective
50. A key that will open all the lock within a particular area or grouping in a given
facility; a.Master key b.Sub master key c.Original key d.Grand master key
51. It is the process of conducting physical examination to determine compliance with
establishment security policies and procedures; a.Security Survey b.Security
Inspection c. Security education d. Security Protection
52. It is given to employees of an installation by lecture and other means pertaining to
measures and safeguards to be taken to protect ; a.Security information b.Security
awareness c. Security education d. Security Preparation
53. Security Guards Creed – As a security guard my __________ duty; a.Basic
b.Honorable c.Fundamental d. Sacred Protection
54. Security guard duty is to serve the interest and mission of his ________; a.Manager
b.Client c.Consultant d.Agency Protection
55. Shall carry with him at all times during his tour of duty his license ID ; a.Ethical
Standard b.Code of Conduct c.General order d.Operators Creed
56. Security Consultant qualifications; choose which one is not belong; a.Filipino and
Alien Citizen b.Physically Fit c.Holder of a Master’s Degree, MNSA or Industrial
Security Management d.At least 10 years experience in the field of security.
57. Shall not read newspaper, magazines, books while actually performing his duties;
a.Ethical Standard b.Code of Conduct c.General order d.Operators Creed
58. Shall not compromise with criminals and other lawless elements to the prejudice of
the customers; a.Ethical Standard b.Code of Conduct c.General order d.Operators
Creed
59. Security force maintained and operates by any private company utilizing any of its
employees to watch, secure or guard; a.Security guard b.Company guard
force c.Government guard unit d.Private guard
60. Shall talk to no one except in the line of duty; a.Ethical Standard b.Code of
Conduct c.General order d.Operators Creed
61. It is the protection resulting from the application of various measures which
safeguards cash and assets which in storage, in transit and during
transaction.; a.Bank Security b.Hotel Security c.Corporate Security d.Communication
Security
62. It is resulting from the protection of processes, formulas, patents and industrial and
manufacturing activities from espionage ; a.Document Security b.Operational
Security c.Corporate Security d.Communication Security
63. It is resulting from the protection of application of various measures which prevent or
delay the enemy or unauthorized person in gaining information; a.Document Security
b.Operational Security c.Corporate Security d.Communication Security
64. It is resulting from the protection classified papers and vital records from loss, access
to unauthorized persons, damage , theft and etc, ; a.Document Security
b.Operational Security c.Corporate Security d.Communication Security
65. The providing of sufficient illumination to areas during hours of darkness to insure
visibility and to act as a deterrent to the intruders; a.Security Alarm system
b.Security Lighting c.Security Surveillance d.Security Flash light
66. It is resulting from the protection top ranking officials of the government or visiting
persons of illustrious standing; a.Document Security b.Operational Security
c.Corporate Security d.VIP Security
67. It is the sum total of all physical safeguards employed or installed to secure the
assets; a.Physical Security b.Document Security c.Personnel Security d.Internal
Security
68. What line of defense is grills? ; a.1 st line of defense b. 2nd line of defense c. 3rd line
of defense d.Barrier Line
69. What line of defense is cabinets? ; a.1 st line of defense b. 2nd line of defense c. 3rd
line of defense d.Barrier Line
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
70. What line of defense is guard? ; a.1st line of defense b. 2nd line of defense c. 3rd line
of defense d.Barrier Line
71. What line of defense is doors? ; a.1 st line of defense b. 2nd line of defense c. 3rd line
of defense d.Barrier Line
72. What line of defense is gate? ; a.1st line of defense b. 2nd line of defense c. 3rd line
of defense d.Barrier Line
73. What line of defense is vaults? ; a.1 st line of defense b. 2nd line of defense c. 3rd
line of defense d.Barrier Line
74. Any structure or physical device capable of restricting, deterring, delaying illegal
access; a.Physcial Barrier b.Perimeter barrier c.Barrier d.Protective Barrier
75. Any medium or structure which define the physical limits of an installation or area to
restrict or impede access thereto; a.Physcial Barrier b.Perimeter barrier c.Barrier
d.Protective Barrier
76. Private Security Agency Law; a.R.A.5487 b.R.A.5847 c.R.A.6975 d.R.A.8551
77. Sometimes called private security guard or watchman shall include any person who
offers or renders personal service to watch; a.Security Officer b.Security
Guard c.Detachment commander d.Security manager
78. A corporate and executive responsibility. It involves knowing the objectives of the
security and the means and methods to reach these objectives; a.Security
Management b.Security Planning c.Security Survey d.Security Audit
79. The process of conducting an exhaustive physical examination and thorough
inspection of all operation system and procedures of a facility; a.Security Survey
b.Security Audit c.Security Inspection d.Security Surveillance
80. The Three Aspects of Security except in one; a.Personnel
b.Document c.Physiological d.Information
81. The sum total of protection scheme encompassing the entire security spectrum,
designed to eliminate, reduce or control threats, hazards, risk or dangers to company
assets; a.Holistic protection b.Asset Protection c.Life protection d.Security Protection
82. SG duties during strikes and lockouts; a.Carry only heavy firearms b.Indirect
confrontation c.Avoid direct contact d.Stay in their perimeters
83. This probabilty ratings has the likelihood of occurrence; a.Virtually Certain b.Highly
Probable c.Moderately Probable d.Improbable
84. In Natural Authority “The highest is the law of self ___________”; a.Protection
b.Defense c.Preservation d.Control
85. Security unit maintained and operated by any government entity other than military
or police for the purpose of securing the office of such government entity;
a.Presidential Security Guard b.Private Guard c.Government guard unit d.Security
guard
86. A written order /schedule issued by a superior officer usually the private security
agency assigning the performance of private security agency; a.Court Order b.Duty
detail order c.Mission order d.Post order
87. Any act or condition which may result in the compromise of information, loss of life,
loss or destruction of property or disruption of the objectives; a.Security
Risk b.Security Hazard c.Security Threat d.Security Vulnerability
88. Added protection of important vital papers, plans, data, special correspondence,
cash and other essentials documents; a.Security barrier b.Security Vault c.Security
Box d.Security cabinet
89. Example of Conflict of interest; a.Sabotage b.Insurecction c.Bribery d.Flood
90. License certificate document issued by the chief, PNP or his duly authorized
representative to operate Security Agency; a.Driver’s License b.PNP License c.License
to Operate d.Operation License
91. This probabilty ratings has more likely to occur that not to occur ; a.Virtually Certain
b.Highly Probable c.Moderately Probable d.Improbable
92. __________ is protection against any type of crime to safeguard life and assets by
various method and advise; a.Guard b.Security c.Authority d.Asset protection
REPUBLIC OF THE PHILIPPINES
J.H. CERILLES STATE COLLEGE – DUMINGAG CAMPUS
Caridad, Dumingag, Zamboanga del Sur
SCHOOL OF CRIMINAL JUSTICE EDUCATION
93. Shall include not only natural but also juridical persons ; a.Employer
b.Military c.Person d.Police
94. Shall cover those in the legitimate business of providing private security and
detective services ; a.Agency b.Public Enforcers c.Private Security Industry d.VIP Body
guard
95. Sometimes called watchman; a.Witness b.Security Guard c.Supervisor d.Manager
96. Shall be natural persons which private security guards, private detectives, security
consultants, security officers and others that may be classified; a.Security Personnel
b.Watch Man c.Juridical persons d. Asset Protector
97. _____________ is charged with directing the work and observing the behavioural
performance of the guard under his unit; a.Owner b.Operation Manager c.Security
manager d.Security supervisor
98. Social Environment Probability Factors; a.Climate b.Income levels c.Composition
d.Latitude
99. A security guard always protect the interest of _________; a.Agency b.Country c.Law
d.Client
100. The Security Guard uniform symbolism of ___________ and confidence; a.Public
Office b.Respect c.Public Trust d.Standard

You might also like