Category: CSS243 0 CSS243 1 / 150 Choose the one that is not appropriates to security management Pluralism Realism Idealism Conflict 2 / 150 Identify the one that is not a category of intelligence Security intelligence Goal intelligenc strategic intelligence Criminal intelligence 3 / 150 _________ is that which poses significant threat to employee’s health and consequently to the health of an organization Job stress Job appointment Shift work Work load 4 / 150 One of these is not an element of compensation and rewards Salary and wages Benefits incentives , Contractual agreement , 5 / 150 NUCINT Stand for _________ Normal Intelligence Nuclear Intelligence Nuclear Instruction Natural Intelligence 6 / 150 LASNT stands for intelligence. Check 7 / 150 The element of staffing are the following except one Career The recruitment and selection Placement , Interview 8 / 150 is a kind of intelligence activity or function carried out by the relevant service or intelligence agency to provide evidence in support of prosecution of any criminal suspects. Check 9 / 150 One of these is not protective discipline for counter intelligence Physical security Combat security Communication security Personnel security 10 / 150 Offensive Counter intelligence include all activities that are targeted towards arresting the mischief of the enemyparties. Check 11 / 150 taught the whole world that commercial planes could be used as the Check 12 / 150 method of performance appraisal or evaluation mainly focuses on particular behaviour or act of employee (s) as it concerns job performance. Check 13 / 150 __________ are device that can secretly hide information or things, they look like ordinary object. Biometric concealment Devices Diversion safe Cryptography 14 / 150 Intelligence tends to focus basically on gathering, analyzing, and evaluating about the capabilities vulnerabilities and aims of foreign countries. Check 15 / 150 SWOT analysis stands for Strength, Opportunity, and Threat. Check 16 / 150 The jounces of intelligence are many to include the following except one Clocking instrument communication technology Internet Intelligence personnel 17 / 150 ________ approach became popular in security studies in the 1970s Realism Idealism Marxism Pluralism 18 / 150 is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign Check 19 / 150 _________ is a structured conversation designed to achieve a purpose Structured conversation Interview Promotion Transfare 20 / 150 is not appropriate to security management Check 21 / 150 Traumatic stress disorder happens as a result of __________ criminalistic Material intelligence death in hazard survival of a hazard 22 / 150 __________ involves collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c Laser intelligence (LASINT) Human intelligence (HUMINT) Open source intelligence (OSINT) Material intelligence 23 / 150 In asymmetric aggression, most times, the weak parties usually adopt _____ in the perpetuation of their violent actions against the enemy-party which is actually stronger cargo Intelligence Guerilla tactic officers 24 / 150 ACOUSTINT Stand for _________ Accidental intelligence Acoustic Intelligence Acquired intelligence aquatic intelligence 25 / 150 The set of people used for espionage include all except one courier Case office Agent commissioner 26 / 150 theorists blame human aggression or war situation on a disparity between the numbers of well educated, well fed, angry "fighting age" young males and the number of positions available to them in society as a primary source of violence Check 27 / 150 n combating crime, several countries have formed community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations Check 28 / 150 Theory believed that violence was inherent in mankind, meaning that aggression formed part of human nature. Check 29 / 150 Analysis is the process through which security organization (or any other organization) gives a detailed explanation and catalogue of the purposes, expectations, duties, fetures, behaviours and relevant skills that a particular job evokes on the job-seekers. Check 30 / 150 Intelligence can be described as a process of gathering and assembling information through several methods for the purpose of producing intelligence Check 31 / 150 Private security is owned by ______ cadre individuals government police 32 / 150 Human intelligence (HUMINT) and Open source intelligence (OSINT) are ___________. security intelligence security intelligence non-technical intelligence discipline Intelligence as structure 33 / 150 Counterintelligence (JC) refers to efforts made by organizations to prevent hostile or enemy intelligence organizations from successfully gathering and collecting intelligence against them. Check 34 / 150 Choose the one that is not appropriate to security management Idealism Pluralism Conflict Realism 35 / 150 Pillars of intelligence Analysis are many but one these is not included Boldness and Honesty Union game Team playin Goal setting 36 / 150 is a process of interrogating a person (suspect) to getting information Check 37 / 150 _________ taught the whole world that commercial planes could be used as the Boko Haram Islamic group Sharia Al-Queda 38 / 150 At the ________ Stage, the body respond when it becomes aware of stress or threat. Alarm Defense Threat Resistance 39 / 150 is illegal beating that may lead to injuring another person. Check 40 / 150 The out come of an intelligence is the Check 41 / 150 is a good tool in information supping which are used by both criminals and law enforcement agents Check 42 / 150 General Adoption Syndrome (GAS) describes the stages an individual encounters in stressful conditions except one resistance stage , Exhaustion stage , Alarm stage , Stand up stage 43 / 150 In contemporary times, definition of security goes beyond the traditional ways of protecting the state against internal and external aggression. Check 44 / 150 Pluralist approach emerged in the ________ 1960s 1950s 1850s 1860s 45 / 150 Security is type of security which involves protecting every individual from any physical violence. Check 46 / 150 The following are causes of job stress except Long hours Role Conflict , Shift work Regular duty 47 / 150 This involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security Counter intelligence strategic intelligence Goal intelligence Communication intelligence 48 / 150 The scope of the does not include making of arrest of armed robbers or terrorists or homicide suspect but only to arrest and prosecute the offenders of economic and financial crimes like money laundering, stealing of public funds among others Check 49 / 150 The following are causes of job stress excep Role Conflict Long hours Regular duty Shift work 50 / 150 are those that voluntarily gives information to law enfprcement agaents. Check 51 / 150 Fire is one of the causes of traumatic disorder TRUE FALSE NOT SURE All of the above 52 / 150 _________ is the product resulting from the collection, evolution, analysis integration and interpretation of all available information which concerns one or more aspect aspect of foreign Obsetration Information Spy Intelligenc 53 / 150 is a process of gathering and assembling information through several methods for the purpose of production intelligence. Check 54 / 150 In Approach to security management, economic factors and struggle for the control of state resources are the bases for security relations among states. Check 55 / 150 ______ is basically that violent struggle between two or more state/non state actors, or groups of actors, who possess a considerable level of unequal relation in the power equilibrium. Asymmetric aggression Physical security Communication security Physical security 56 / 150 intelligence enables us to appreciate the need to look at intelligence from dual perspective: our strengths and vulnerabilities or weaknesses Check 57 / 150 The technical forms of intelligence disciplines include the following except one Signal intelligence (SIGNIT) Linage of intelligence (IMINT) measurement and signatures intelligence (MASINT) Data collection intelligence 58 / 150 Espionage usually involves the art of or secretly collecting information through the use of human sources Check 59 / 150 Traditionally, management was the unilateral function of the state. Check 60 / 150 management is hat part of management concerned with people at work and with their relationship within an enterprise. Check 61 / 150 This is the kind of intelligence carried out in support of prosecution of any criminal suspects Strategic intelligence Goal intelligence Criminal intelligence Security intelligence 62 / 150 This is the kind of intelligence carried out in support of prosecution of any criminal suspects Security intelligence Strategic intelligence Goal intelligence Criminal intelligence 63 / 150 Every employee has a role to play in the actualization of the ultimate of the organization Check 64 / 150 Tactical Intelligence involves devolution of responsibility among the hierarchy of personnel in an intelligence service such that information are collected, collated, analyzed and evaluated for the use by the or top management for short term policy agenda Check 65 / 150 Identify the one that is not a category of intelligence Goal intelligence strategic intelligence Security intelligence Criminal intelligence 66 / 150 _is a form of violent crime, which involves unlawful attack aimed at causing bodily injury to another party or person. Check 67 / 150 ________ Stage describes the phase where the individual’s defense mechanism becomes active. Stress Defense Resistance Active 68 / 150 In combating crime, several countries have formed ____ community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations international police {interpole} community police Nation police Interstate police 69 / 150 MASINT stands for measurement and intelligence. Check 70 / 150 OSINT stands for Source Intelligence. Check 71 / 150 Theory focuses basically on the grand function of violence rather than the origin of violence or the relationship between the human nature and war or violence. Check 72 / 150 Approach to security management opine that security can best be managed through noncoercive or non-violence process, owing to the fact that violence would only give birth to further violence. Check 73 / 150 involves putting questions to person(s) with the aim Check 74 / 150 _________ taught the whole world that commercial planes could be used as terrorist target Al-Qaeda Islamic group Boko Haram Sharia 75 / 150 Traumatic disorder are caused by the following except one war/torture , Pleasure , Fire , Falls 76 / 150 RF/ENPINT stands for frequency/ Electromagnetic pulse intelligence. Check 77 / 150 These are the methods of performance appraisal except one Multi-Raters , written Assessment Behaviour Rating scale , Physical Assessment , 78 / 150 Goal intelligence is not a category of Check 79 / 150 Getting information from a criminal suspect is through infliction of physical pain Check 80 / 150 security management was the unilateral function of the state especially if we consider the intellectual view(s) of some political theorists like Check 81 / 150 The following are the several forms of MASINT except one ._______ Tick the odd one Radar intelligence (RADINT) acoustic intelligence (ACOUSTINT) Nuclear intelligence (NUCINT) Non material intelligence 82 / 150 The out come of an intelligence is the ______ Structure Process service Product 83 / 150 Approach to security management was a departure from the statecentered security system that dominated the world system during the early cold era. Check 84 / 150 According to _________ approach, economic factors and struggle for the control of State resources are the bases for security relations among states Pluralism Marxism Realism Idealism 85 / 150 An approach to security which advocates for more cultural understanding to security studies is Check 86 / 150 are device that can secretly hide information or things, they look like ordinary object Check 87 / 150 In his model of cycle of violence, Lenore Walker presented to explain the impact that a domestic violence will have on the relationship between the perpetrator and victim. Check 88 / 150 Physical Security is the duty of services to ensure protection of their physical infrastructure against attacks by enemies that operate within and outside. Check 89 / 150 are also known as assets Check 90 / 150 Intelligence can be described as a process of gathering and assembling information through several methods for the purpose of producing intelligence. Check 91 / 150 is not appropriate to security management Check 92 / 150 operation are often targeted towards collecting strategic information for intelligence purpose Check 93 / 150 Violence is often referred to as a form of violence involving child abuse, elder abuse, and other form of aggressive behavior between two or more people within the same family or household Check 94 / 150 Couriers are support personnel who assist the in managing their clandestine communication by securing them (the communications) against enemy’s interceptions or detection. Check 95 / 150 This involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security strategic intelligence Communication intelligence Co-intelligence Goal intelligence Counter intelligence 96 / 150 Examples of ________ includes invisible ink, chaffing and winnowing Counter intelligence officer steganograhy agent , stenography 97 / 150 One of the principles of security is that everyone is a potential _____ suspect danger security victim 98 / 150 taught the whole world that commercial planes could be used as the Check 99 / 150 __________ is the collection of intelligence through the use of satellite images Imagery intelligence Human intelligence Open course intelligence Signal intelligence (SIGNIT) 100 / 150 Identify the one that is not a category of intelligence Security intelligence Goal intelligencE strategic intelligence Criminal intelligence 101 / 150 Theory was popularized by Paul and Patricia Brantingham in the 1980s. Check 102 / 150 The features of job description includes but one Job title Description of duties Career Hierarchy 103 / 150 In combating crime, several countries have formed community to arrest and prosecute or even repatriate criminal suspects who are creating security problems to any of the member nations Check 104 / 150 _______ is a process of gathering and assembling information through several methods for the purpose of production intelligence. Intelligence information Intelligence analyses Intelligence data Intelligence collection 105 / 150 The out come of an intelligence is the ___________ service Structure Product Process 106 / 150 is a concept that has attracted huge attention among the scholars in peace and conflict studies, criminology and security studies as well psychology. Check 107 / 150 ________ is a good jounce of motivation in which security personnel have opportunities to move upwardly one rank to the other Promotion Transfare good warefare packag Salary Increment 108 / 150 The process of gathering and assembling information through several methods for the purpose of production intelligence is ______ security intelligence intelligence collection , Special agents , Counter intelligence 109 / 150 __________ approach was a departure from the statecentered security system that dominated the world system during the early cold war era. Idealism Conflict Pluralism Realism 110 / 150 Health Security involves against HIV-AIDS pandemics and other diseases like malaria that accounts for a very high mortality rate. Check 111 / 150 ___________ involves putting questions to persons with the aim of getting information which can help, which can aid intelligence Black bag operations Interrogation Courier Cash officers 112 / 150 In phase, there is tension freezing; the atmosphere is rented with affection, apology, and end to the violence. Check 113 / 150 information from him/her through infliction of extreme physical pain. Nuclear intelligence (NUCINT) Non material intelligence Radar intelligence (RADINT) acoustic intelligence (ACOUSTINT) 114 / 150 ________the systematic assessment of job in relation to strengths and weaknesses of any employee or group of employees. Employees' test interview Job assessment Performance appraisal 115 / 150 Counter intelligence aspect draws its attention on identifying vulnerable areas in one’s intelligence organization(s) which can be explored by foreign intelligence services (FIS). Check 116 / 150 Operations are clandestine or secret) ways of making (illegitimate) entry into the information facility (ies) of any target party for intelligence purpose(s) Check 117 / 150 One of these is not a dimension of intelligence Intelligence as a process Intelligence as a product Intelligence as structure Intelligence as information 118 / 150 is not a category of intelligence Check 119 / 150 Measurement and Signatures Intelligence (MASINT) is scientific and intelligence Check 120 / 150 Non coercion or Non-violent is the approach of ____. idealism Special agent Marxist theory environmental theory 121 / 150 Approaches to Public Relation Management in security sectors are the following except one Spin Audience Targeting Taking to Audience , Direct Communication 122 / 150 involve collection of intelligence through public sources like archival resources government documents academic and professional material media e.t.c Check 123 / 150 Intelligence personnel, Government institutions, Mass Media, communication technology e. t.c. are _________. Intelligence as structure security intelligence , Source of intelligence , Counter intelligence officer 124 / 150 Crime has become alternative route through which people can meet their needs All of the above TRUE NOT SURE TRUE 125 / 150 OWVL stands for One-Way Voice Check 126 / 150 is a structured conversation designed to achieve a purpose. The purpose ranges from (ordinary) information research job offer. Check 127 / 150 ________ is a process of gathering and assembling information through several methods for the purpose of production intelligence. Intelligence information Intelligence data Intelligence collection Intelligence analyses 128 / 150 intelligence is the kind of intelligence carried out in support of prosecution of any criminal suspects Check 129 / 150 ______ symbolized protection from the threat of disease, hunger, unemployed, crime, social conflict, Political repression and environment hazard. Double agents Marxist theory human security environmental theory 130 / 150 Theory of violence is of the view that violence is a function of class struggle. Check 131 / 150 On the Job training is form of training acquired simultaneously as the security personnel carry – out their duties None of the above NOT SURE Ttrue FALSE 132 / 150 Identify the one that is not a principle of personnel management Job Specification job Description Job Design Job operation 133 / 150 Counter involves measures to counter any foreign intelligence activities, capable of constituting a threat to national security Check 134 / 150 The major difference between private secuirty and publicsecurity is the possession of ____ quota system intellidence uniform arms and amunition 135 / 150 Pillars of intelligence Analysis are many but one of these is not included Union game Boldness and Honesty Goal setting Team playing 136 / 150 is unwanted sexual activity like touching some sensitive parts of the victim. Check 137 / 150 Choose the one that does not belong to the type of training External training , Intro training Off the Job training On the Job training , 138 / 150 The gathering of intelligence through interception or seizing of electronic communications is __________ SIGNIT OSINT HUMINT IMINT 139 / 150 Another source of domestic violence is social Check 140 / 150 has become alternative route through which people can meet their needs? Check 141 / 150 underscores the strategic importance that selfsustenance in food production has on the security of any nation Check 142 / 150 The use of satellite images for the collection of intelligence is _________ IMINT SIGNIT OSINT HUMINT 143 / 150 The methods of ______ including suggestibility, Reid, Deception and torture Special spies Counter intelligence officer Special agents Double agents 144 / 150 ________ held that in some cases, stress can be desirable to both an organization and individua ls. John Legend williams wendy Wendy Boswell James Boswell 145 / 150 The 9/11 terrorist incident took place in the Great Britain United State of America Gambia Russia 146 / 150 wrote that populations will continue to increase until they are limited by war, disease, or famine. Check 147 / 150 ________ is the scheduling system of work, which impinges excessive physical and psychological costs to the worker long hour work poor working condition Shift work Role Conflict 148 / 150 The methods of interrogation includes the following except one .Pick the odd one Reid Future Deception Murder 149 / 150 The business of spying is structured in a form Check 150 / 150 IMINT stands for of Intelligence. Check Restart quiz Rate this quiz Send feedback