Loading...



Category: CSS243

0

CSS243

1 / 150

Choose the one that is not
appropriates to security
management

2 / 150

Identify the one that is not a
category of intelligence

3 / 150

_________ is that which
poses significant threat to
employee’s health and
consequently to the health
of an organization

4 / 150

One of these is not an
element of compensation
and rewards

5 / 150

NUCINT Stand for
_________

6 / 150

LASNT stands for
intelligence.

7 / 150

The element of staffing are
the following except one

8 / 150

is a kind of intelligence
activity or function carried
out by the relevant service
or intelligence agency to
provide evidence in support
of prosecution of any
criminal suspects.

9 / 150

One of these is not
protective discipline for
counter intelligence

10 / 150

Offensive Counter
intelligence
include all activities that are
targeted towards arresting
the mischief of the enemyparties.

11 / 150

taught the whole world that
commercial planes could be
used as the

12 / 150

method of performance
appraisal or evaluation
mainly focuses on particular
behaviour or act of
employee (s) as it concerns
job performance.

13 / 150

__________ are device
that can secretly hide
information or things, they
look like ordinary object.

14 / 150

Intelligence tends to focus
basically on gathering,
analyzing, and evaluating
about the capabilities
vulnerabilities and aims of
foreign countries.

15 / 150

SWOT analysis stands for
Strength,
Opportunity, and Threat.

16 / 150

The jounces of intelligence
are many to include the
following except one

17 / 150

________ approach
became popular in security
studies in the 1970s

18 / 150

is the product resulting from
the collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

19 / 150

_________ is a structured
conversation designed to
achieve a purpose

20 / 150

is not appropriate to
security management

21 / 150

Traumatic stress disorder
happens as a result of
__________

22 / 150

__________ involves
collection of intelligence
through public sources like
archival resources
government documents
academic and professional
material media e.t.c

23 / 150

In asymmetric aggression,
most times, the weak
parties usually adopt _____
in the perpetuation of their
violent actions against the
enemy-party which is
actually stronger

24 / 150

ACOUSTINT Stand for
_________

25 / 150

The set of people used for
espionage include all
except one

26 / 150

theorists blame human
aggression or war situation
on a disparity between the
numbers of well educated,
well fed, angry "fighting
age" young males and the
number of positions
available to them in society
as a primary source of
violence

27 / 150

n combating crime, several
countries have formed
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

28 / 150

Theory believed that
violence was inherent in
mankind, meaning that
aggression formed part of
human nature.

29 / 150

Analysis is the process
through which security
organization (or any other
organization) gives a
detailed explanation and
catalogue of the purposes,
expectations, duties,
fetures, behaviours and
relevant skills that a
particular job evokes on the
job-seekers.

30 / 150

Intelligence
can be described as a
process of gathering and
assembling information
through several methods
for the purpose of
producing intelligence

31 / 150

Private security is owned by
______

32 / 150

Human intelligence
(HUMINT) and Open
source intelligence (OSINT)
are ___________.

33 / 150

Counterintelligence (JC)
refers to efforts made by
organizations to prevent
hostile or enemy
intelligence organizations
from successfully gathering
and collecting intelligence
against them.

34 / 150

Choose the one that is not
appropriate to security
management

35 / 150

Pillars of intelligence
Analysis are many but one
these is not included

36 / 150

is a process of interrogating
a person (suspect) to
getting information

37 / 150

_________ taught the
whole world that
commercial planes could be
used as the

38 / 150

At the ________ Stage, the
body respond when it
becomes aware of stress or
threat.

39 / 150

is illegal beating that may
lead to injuring another
person.

40 / 150

The out come of an
intelligence is the

41 / 150

is a good tool in information
supping which are used by
both criminals and law
enforcement agents

42 / 150

General Adoption
Syndrome (GAS) describes
the stages an individual
encounters in stressful
conditions except one

43 / 150

In contemporary times,
definition of security goes
beyond the traditional
ways of protecting the state
against internal and
external aggression.

44 / 150

Pluralist approach emerged
in the ________

45 / 150

Security is type of security
which involves protecting
every individual from any
physical violence.

46 / 150

The following are causes of
job stress except

47 / 150

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

48 / 150

The scope of the
does not include making of
arrest of armed robbers or
terrorists or homicide
suspect but only to arrest
and prosecute the
offenders of economic and
financial crimes like money
laundering, stealing of
public funds among others

49 / 150

The following are causes of
job stress excep

50 / 150

are those that voluntarily
gives information to law
enfprcement agaents.

51 / 150

Fire is one of the causes of
traumatic disorder

52 / 150

_________ is the product
resulting from the
collection, evolution,
analysis integration and
interpretation of all
available information which
concerns one or more
aspect aspect of foreign

53 / 150

is a process of gathering
and assembling information
through several methods
for the purpose of
production intelligence.

54 / 150

In
Approach to security
management, economic
factors and struggle for the
control of state resources
are the bases for security
relations among states.

55 / 150

______ is basically that
violent struggle between
two or more state/non state
actors, or groups of actors,
who possess a
considerable level of
unequal relation in the
power equilibrium.

56 / 150

intelligence enables us to
appreciate the need to look
at intelligence from dual
perspective: our strengths
and vulnerabilities or
weaknesses

57 / 150

The technical forms of
intelligence disciplines
include the following except
one

58 / 150

Espionage usually involves
the art of
or secretly collecting
information through the use
of human sources

59 / 150

Traditionally,
management was the
unilateral function of the
state.

60 / 150

management is hat part of
management concerned
with people at work and
with their relationship within
an enterprise.

61 / 150

This is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

62 / 150

This is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

63 / 150

Every employee has a role
to play in the actualization
of the ultimate
of the organization

64 / 150

Tactical Intelligence
involves devolution of
responsibility among the
hierarchy of personnel in an
intelligence service such
that information are
collected, collated,
analyzed and evaluated for
the use by the
or top management for
short term policy agenda

65 / 150

Identify the one that is not a
category of intelligence

66 / 150

_is a form of violent crime,
which involves unlawful
attack aimed at causing
bodily injury to another
party or person.

67 / 150

________ Stage describes
the phase where the
individual’s defense
mechanism becomes
active.

68 / 150

In combating crime, several
countries have formed ____
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

69 / 150

MASINT stands for
measurement and
intelligence.

70 / 150

OSINT stands for
Source Intelligence.

71 / 150

Theory focuses basically on
the grand function of
violence rather than the
origin of violence or the
relationship between the
human nature and war or
violence.

72 / 150

Approach to security
management opine that
security can best be
managed through noncoercive or non-violence
process, owing to the fact
that violence would only
give birth to further
violence.

73 / 150

involves putting questions
to person(s) with the aim

74 / 150

_________ taught the
whole world that
commercial planes could be
used as terrorist target

75 / 150

Traumatic disorder are
caused by the following
except one

76 / 150

RF/ENPINT stands for
frequency/ Electromagnetic
pulse intelligence.

77 / 150

These are the methods of
performance appraisal
except one

78 / 150

Goal intelligence is not a
category of

79 / 150

Getting information from a
criminal suspect is through
infliction of
physical pain

80 / 150

security management was
the unilateral function of the
state especially if we
consider the intellectual
view(s) of some political
theorists like

81 / 150

The following are the
several forms of MASINT
except one ._______ Tick
the odd one

82 / 150

The out come of an
intelligence is the ______

83 / 150

Approach to security
management was a
departure from the statecentered security system
that dominated the world
system during the early
cold era.

84 / 150

According to _________
approach, economic factors
and struggle for the control
of State resources are the
bases for security relations
among states

85 / 150

An approach to security
which advocates for more
cultural understanding to
security studies is

86 / 150

are device that can secretly
hide information or things,
they look like ordinary
object

87 / 150

In his model of cycle of
violence, Lenore Walker
presented
to explain the impact that a
domestic violence will have
on the relationship between
the perpetrator and victim.

88 / 150

Physical Security is the
duty of
services to ensure
protection of their physical
infrastructure against
attacks by enemies that
operate within and outside.

89 / 150

are also known as assets

90 / 150

Intelligence
can be described as a
process of gathering and
assembling information
through several methods
for the purpose of
producing intelligence.

91 / 150

is not appropriate to
security management

92 / 150

operation are often targeted
towards collecting strategic
information for intelligence
purpose

93 / 150

Violence is often referred to
as a form of violence
involving child abuse, elder
abuse, and other form of
aggressive behavior
between two or more
people within the same
family or household

94 / 150

Couriers are support
personnel who assist the
in managing their
clandestine communication
by securing them (the
communications) against
enemy’s interceptions or
detection.

95 / 150

This involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

96 / 150

Examples of ________
includes invisible ink,
chaffing and winnowing

97 / 150

One of the principles of
security is that everyone is
a potential _____

98 / 150

taught the whole world that
commercial planes could be
used as the

99 / 150

__________ is the
collection of intelligence
through the use of satellite
images

100 / 150

Identify the one that is not a
category of intelligence

101 / 150

Theory was popularized by
Paul and Patricia
Brantingham in the 1980s.

102 / 150

The features of job
description includes but one

103 / 150

In combating crime, several
countries have formed
community to arrest and
prosecute or even
repatriate criminal suspects
who are creating security
problems to any of the
member nations

104 / 150

_______ is a process of
gathering and assembling
information through several
methods for the purpose of
production intelligence.

105 / 150

The out come of an
intelligence is the
___________

106 / 150

is a concept that has
attracted huge attention
among the scholars in
peace and conflict studies,
criminology and security
studies as well psychology.

107 / 150

________ is a good jounce
of motivation in which
security personnel have
opportunities to move
upwardly one rank to the
other

108 / 150

The process of gathering
and assembling information
through several methods
for the purpose of
production intelligence is
______

109 / 150

__________ approach was
a departure from the statecentered security system
that dominated the world
system during the early
cold war era.

110 / 150

Health Security involves
against HIV-AIDS
pandemics and other
diseases like malaria that
accounts for a very high
mortality rate.

111 / 150

___________ involves
putting questions to
persons with the aim of
getting information which
can help, which can aid
intelligence

112 / 150

In
phase, there is tension
freezing; the atmosphere is
rented with affection,
apology, and end to the
violence.

113 / 150

information from him/her
through infliction of extreme
physical pain.

114 / 150

________the systematic
assessment of job in
relation to strengths and
weaknesses of any
employee or group of
employees.

115 / 150

Counter intelligence aspect
draws its attention on
identifying vulnerable areas
in one’s intelligence
organization(s) which can
be explored by foreign
intelligence services (FIS).

116 / 150

Operations are clandestine
or secret) ways of making
(illegitimate) entry into the
information facility (ies) of
any target party for
intelligence purpose(s)

117 / 150

One of these is not a
dimension of intelligence

118 / 150

is not a category of
intelligence

119 / 150

Measurement and
Signatures Intelligence
(MASINT) is scientific and
intelligence

120 / 150

Non coercion or Non-violent
is the approach of ____.

121 / 150

Approaches to Public
Relation Management in
security sectors are the
following except one

122 / 150

involve collection of
intelligence through public
sources like archival
resources government
documents academic and
professional material media
e.t.c

123 / 150

Intelligence personnel,
Government institutions,
Mass Media,
communication technology
e. t.c. are _________.

124 / 150

Crime has become
alternative route through
which people can meet
their needs

125 / 150

OWVL stands for One-Way
Voice

126 / 150

is a structured conversation
designed to achieve a
purpose. The purpose
ranges from (ordinary)
information research job
offer.

127 / 150

________ is a process of
gathering and assembling
information through several
methods for the purpose of
production intelligence.

128 / 150

intelligence is the kind of
intelligence carried out in
support of prosecution of
any criminal suspects

129 / 150

______ symbolized
protection from the threat of
disease, hunger,
unemployed, crime, social
conflict, Political repression
and environment hazard.

130 / 150

Theory of violence is of the
view that violence is a
function of class struggle.

131 / 150

On the Job training is form
of training acquired
simultaneously as the
security personnel carry –
out their duties

132 / 150

Identify the one that is not a
principle of personnel
management

133 / 150

Counter
involves measures to
counter any foreign
intelligence activities,
capable of constituting a
threat to national security

134 / 150

The major difference
between private secuirty
and publicsecurity is the
possession of ____

135 / 150

Pillars of intelligence
Analysis are many but one
of these is not included

136 / 150

is unwanted sexual activity
like touching some
sensitive parts of the victim.

137 / 150

Choose the one that does
not belong to the type of
training

138 / 150

The gathering of
intelligence through
interception or seizing of
electronic communications
is __________

139 / 150

Another source of domestic
violence is social

140 / 150

has become alternative
route through which people
can meet their needs?

141 / 150

underscores the strategic
importance that selfsustenance in food
production has on the
security of any nation

142 / 150

The use of satellite images
for the collection of
intelligence is _________

143 / 150

The methods of ______
including suggestibility,
Reid, Deception and torture

144 / 150

________ held that in some
cases, stress can be
desirable to both an
organization and individua
ls.

145 / 150

The 9/11 terrorist incident
took place in the

146 / 150

wrote that populations will
continue to increase until
they are limited by war,
disease, or famine.

147 / 150

________ is the scheduling
system of work, which
impinges excessive
physical and psychological
costs to the worker

148 / 150

The methods of
interrogation includes the
following except one .Pick
the odd one

149 / 150

The business of spying is
structured in a
form

150 / 150

IMINT stands for
of Intelligence.

Rate this quiz